Download - How to Effectively Secure your Assets
![Page 1: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/1.jpg)
a globaledit bite-sized webinar
Matt GlueckertProduct Manager
Enterprise Application Security
@globaledit
Ted HarringtonIndependent Security Evaluators
![Page 2: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/2.jpg)
ISE Proprietary
About ISE
- Perspective - White Box
- Analysts - Hackers; Cryptographers; RE
- Exploits - iPhone; Android; Ford; Exxon; Diebold
- Research - Routers; NAS; Healthcare
- Customers - Companies w/valuable assets to protect
![Page 3: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/3.jpg)
ISE Proprietary
Secure Design Principles
![Page 4: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/4.jpg)
ISE Proprietary
Least Privilege
![Page 5: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/5.jpg)
ISE Proprietary
Least Privilege
![Page 6: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/6.jpg)
ISE Proprietary
Least Privilege
![Page 7: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/7.jpg)
ISE Proprietary
Defense in Depth
![Page 8: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/8.jpg)
ISE Proprietary
Defense in Depth
Traditional DefensesTraditional Attacks
![Page 9: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/9.jpg)
ISE Proprietary
Defense in Depth
![Page 10: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/10.jpg)
ISE Proprietary
Psychological Acceptability
![Page 11: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/11.jpg)
ISE Proprietary
Psychological Acceptability
CONFLICT IS GOOD!
![Page 12: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/12.jpg)
ISE Proprietary
Psychological Acceptability
![Page 13: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/13.jpg)
ISE Proprietary
Psychological Acceptability
![Page 14: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/14.jpg)
ISE Proprietary
Psychological Acceptability
![Page 15: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/15.jpg)
ISE Proprietary
Mitigating Risk
![Page 16: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/16.jpg)
ISE Proprietary
Threat Model
Assets
Adversaries
Architecture
![Page 17: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/17.jpg)
ISE Proprietary
Threat Model
Asset Value: Asset Value:
![Page 18: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/18.jpg)
ISE Proprietary
Adversary Motivation
![Page 19: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/19.jpg)
ISE Proprietary
Assessment Methodology
![Page 20: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/20.jpg)
ISE Proprietary
Assessment Methodology
![Page 21: How to Effectively Secure your Assets](https://reader034.vdocument.in/reader034/viewer/2022042602/55a930ff1a28ab792a8b45e5/html5/thumbnails/21.jpg)
facebook.com/globaledit
@globaleditRetouching Workflow February 10th
2pm ET
Next Snackinar