how to effectively secure your assets
TRANSCRIPT
a globaledit bite-sized webinar
Matt GlueckertProduct Manager
Enterprise Application Security
@globaledit
Ted HarringtonIndependent Security Evaluators
ISE Proprietary
About ISE
- Perspective - White Box
- Analysts - Hackers; Cryptographers; RE
- Exploits - iPhone; Android; Ford; Exxon; Diebold
- Research - Routers; NAS; Healthcare
- Customers - Companies w/valuable assets to protect
ISE Proprietary
Secure Design Principles
ISE Proprietary
Least Privilege
ISE Proprietary
Least Privilege
ISE Proprietary
Least Privilege
ISE Proprietary
Defense in Depth
ISE Proprietary
Defense in Depth
Traditional DefensesTraditional Attacks
ISE Proprietary
Defense in Depth
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Psychological Acceptability
CONFLICT IS GOOD!
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Psychological Acceptability
ISE Proprietary
Mitigating Risk
ISE Proprietary
Threat Model
Assets
Adversaries
Architecture
ISE Proprietary
Threat Model
Asset Value: Asset Value:
ISE Proprietary
Adversary Motivation
ISE Proprietary
Assessment Methodology
ISE Proprietary
Assessment Methodology
facebook.com/globaledit
@globaleditRetouching Workflow February 10th
2pm ET
Next Snackinar