In The Beginning
To quote Charlie Brown, “Aaaaaaaaaaaargh!” Haven’t we learned anything? The mantra for years has been to build security in at the beginning not the end. Continue reading
To quote Charlie Brown, “Aaaaaaaaaaaargh!” Haven’t we learned anything? The mantra for years has been to build security in at the beginning not the end. Continue reading
“2013 NASA Advanced Technology Phase I Concepts Selected For Study
WASHINGTON — NASA has selected 12 proposals for study under Phase I of the NASA Innovative Advanced Concepts (NIAC) Program, which aims to turn science fiction into fact. Continue reading
In my work as a software architect and security expert, I always consider boundary conditions such as malicious input as opposed to normal behavior. I also consider innocuous errors that could lead to disastrous consequences.
I immediately applied this approach to the NSA Prism program and came up with 3 scenarios:
ITMPI Webinar Series: https://www.itmpi.org
Free, Live, PDU Accredited Lectures
2013 Program Schedule: https://www.itmpi.org/ITMarketplace/AdvancedITCourseware.aspx
Click Here to View our Webinar Recordings:
https://www.itmpi.org/ITMarketplace/WebinarRecordings.aspx
All LIVE Webinars are accredited with 1 PDU credit. Courses and PDU’s are provided by CAI (REP #2733)
The #1 Global Threat: Cyber
July 16, 2013
11:00 AM – 12:30 PM EST
PDU accredited
Presented by: Carolyn Turbyfill
The global threat environment is changing. This environment is demanding re-evaluations of the way we do business, expanding our analytical envelope, and altering the vocabulary of intelligence. Cyber threats are more diverse, interconnected, and viral than at any time in history. Attacks, which might involve cyber and financial weapons, can be deniable and un-attributable, In this webinar, Dr. Carolyn Turbyfill will present an overview of global cyber challenges, threats and then discuss enterprise risk management (ERM) solutions in terms of cyber standards development, new cyber management systems/taxonomies, and cyber risk management/assurance/control methodologies.
You need to know the eight ‘fair information practice principles.
On February 2, 2012, the White House issued an Executive Order “Improving Critical Infrastructure Cybersecurity”:
http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity Continue reading