SlideShare uma empresa Scribd logo
1 de 15
Building Security Models To Help Make Business Decisions  Dave Cullinane Gordon Shevlin Preston Wood William Tang  04/29/09 | Session ID: PROF-403
Common Questions from Exec Mgmt ,[object Object],[object Object],[object Object],Provide insight to solve these challenges and real world examples Understand methodology and approach to leverage security and business metrics effectively Make more informed business decisions and prove security return on investment (ROI) Educate + Learn = Apply
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Security Framework
Security Controls Mapping
Security Controls Mapping
Security Gap Analysis
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Obtain Business & Security Metrics
Obtain Business & Security Metrics
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Prove Security ROI ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Develop Security Strategy & Models
Q&A

Mais conteúdo relacionado

Destaque

Psicología de las masas y análisis del yo
Psicología de las masas y análisis del yoPsicología de las masas y análisis del yo
Psicología de las masas y análisis del yoAlvaro Barrios Requena
 
Safe inlet The Device For Road security
Safe inlet The Device For Road securitySafe inlet The Device For Road security
Safe inlet The Device For Road securityMarino Salvatore
 
從104會考看閱讀教學 02尋讀與精讀
從104會考看閱讀教學   02尋讀與精讀從104會考看閱讀教學   02尋讀與精讀
從104會考看閱讀教學 02尋讀與精讀黃 韻如
 
The excretory system Morad
The excretory system MoradThe excretory system Morad
The excretory system Moradcraentredosrios
 
Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2Daklak Training College
 
animal facts
animal factsanimal facts
animal factsAnyChild
 
活動四北極熊論證
活動四北極熊論證活動四北極熊論證
活動四北極熊論證bell5
 
Ionic y angular.js
Ionic y angular.jsIonic y angular.js
Ionic y angular.jsGDG Cali
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business sideAnton Galitskiy
 
Planeacion ultimate bachillerato
Planeacion ultimate bachilleratoPlaneacion ultimate bachillerato
Planeacion ultimate bachilleratoandres muñoz
 

Destaque (12)

Psicología de las masas y análisis del yo
Psicología de las masas y análisis del yoPsicología de las masas y análisis del yo
Psicología de las masas y análisis del yo
 
Safe inlet The Device For Road security
Safe inlet The Device For Road securitySafe inlet The Device For Road security
Safe inlet The Device For Road security
 
從104會考看閱讀教學 02尋讀與精讀
從104會考看閱讀教學   02尋讀與精讀從104會考看閱讀教學   02尋讀與精讀
從104會考看閱讀教學 02尋讀與精讀
 
The excretory system Morad
The excretory system MoradThe excretory system Morad
The excretory system Morad
 
Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2
 
animal facts
animal factsanimal facts
animal facts
 
Indian marriage
Indian marriageIndian marriage
Indian marriage
 
活動四北極熊論證
活動四北極熊論證活動四北極熊論證
活動四北極熊論證
 
Ionic y angular.js
Ionic y angular.jsIonic y angular.js
Ionic y angular.js
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business side
 
Indian Stock Market
Indian Stock MarketIndian Stock Market
Indian Stock Market
 
Planeacion ultimate bachillerato
Planeacion ultimate bachilleratoPlaneacion ultimate bachillerato
Planeacion ultimate bachillerato
 

Semelhante a RSA Conference 09 - Building Security Models to Support Business Decisions 090429

Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Anton Chuvakin
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerPlatformSecurityManagement
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docxAASTHA76
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
Security Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxSecurity Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxjeffreye3
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnicalJack585826
 
Managing Products Portfolios
Managing Products PortfoliosManaging Products Portfolios
Managing Products PortfoliosPierre Gagne
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security programWilliam Godwin
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSecurestorm
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimmMarie Peters
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docxAASTHA76
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docxaryan532920
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docxAASTHA76
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application SecurityTy Sbano
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxsleeperharwell
 
Leverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for InnovationLeverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for InnovationGlorium Tech
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptNeha Sharma
 

Semelhante a RSA Conference 09 - Building Security Models to Support Business Decisions 090429 (20)

Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
Security Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxSecurity Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docx
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
 
Managing Products Portfolios
Managing Products PortfoliosManaging Products Portfolios
Managing Products Portfolios
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
 
Leverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for InnovationLeverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for Innovation
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

RSA Conference 09 - Building Security Models to Support Business Decisions 090429

Notas do Editor

  1. Security funding and support can’t rely on regulatory drivers. Its time CISOs, Risk Mgmt officers, and other groups demonstrate security ROI and communicate security strategy in terms that executive management understands.
  2. Understand the ‘forces’ that result in a change to the effectiveness of the security framework.