Security & Risk Management

I went to buy a bed with my sister the other day and the salesman was chatting away telling us how he couldn’t get his state refund because someone had stolen his identity and collected his refund.  

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

RefuseServiceDenial-of-Service Attacks

  • Prevents systems from processing or responding to legitimate traffic
  • Transmits data packets
  • Exploits a known fault in an OS, service or application
  • Results in system crash or CPU at 100%
  • Distributed reflective denial of service DRDoS
  • Reflected approach, rather than direct to victim, manipulates traffic so that attack is reflected back to victim from other sources
  • Example: DNS Poisoning and SMURF

    User Rating: 0 / 5

    Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

What is FIDO? FIDO is the World’s Largest Ecosystem for Standards-Based, Interoperable Authentication
BETTER SECURITY FOR ONLINE SERVICES, REDUCED COST FOR THE ENTERPRISE, SIMPLER AND SAFER FOR CONSUMERS

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

INTERNET of THINGS RESEARCH STUDY - SECURITY AND VULNERABILITY ASSESSMENT

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Firewall Planning and Design

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Center For Internet Security Critical Security Controls V.6.1

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

RiskWatch Implementation Rescue - Total Implementation in Eight Weeks or Less

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
White Hat With No Permission

Can you pen test?  Can you do it better than a blackhat? View this presentation full screen

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Since the 2017 travel ban and the intense turmoil over relations in and out of the United States, this article remains relevant to issues of the secure human.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
CISO Summit

CISO Forum 2016 at the Ritz-Carlton Half Moon Bay

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
CISO Summit

We’ve been having a continuous compliance conversation, but did you know that compliance is a fabric that breaks down over time?

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

90 sides take you through process and technical aspects of Risk Oversight and Risk Exposure Analysis.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Big Risk Big Data

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Perfect Trap

Challenge - Can you describe a fraud event that would not have been caught by any of these six controls?  

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

critical controls poster page one

critical controls poster 6.1 page 2

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Subcategories