SlideShare a Scribd company logo
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security

More Related Content

PPT
Information Security
PDF
What is still missed for security real life facts
PDF
Protecting Essential Information
PDF
The Trick to Passing Your Next Compliance Audit
PPTX
Cut The Clutter: What You Have, What You Need, and What You Can Safely Get Ri...
PDF
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
PDF
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
Information Security
What is still missed for security real life facts
Protecting Essential Information
The Trick to Passing Your Next Compliance Audit
Cut The Clutter: What You Have, What You Need, and What You Can Safely Get Ri...
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Infographic: 5 Tips for Approaching Customers About Cloud Security
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...

Similar to Using Pattern-based design to Drive Disruptive Information Security (20)

PPT
The Rational Approach to Disruptive Information Security
PPTX
Data Management - NA CACS 2009
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PDF
Continuous PCI and GDPR Compliance With Data-Centric Security
PPTX
Opportunities with data science
PPTX
Information Security For Small Business
PDF
The good, the bad and the ugly of the target data breach
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PDF
Security, Audit and Compliance: course overview
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
10 Steps for Taking Control of Your Organization's Digital Debris
PPTX
Information security for small business
PDF
Slides to the online event "Creating an effective cybersecurity strategy" by ...
PDF
[Webinar Slides] From ECM to Intelligent Information Management
PDF
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
Cloud & Sécurité
PDF
Real-World Data Science (Fraud Detection, Customer Churn & Predictive Mainten...
PPTX
2015 KSU So You Want To Be in Cyber Security
PPTX
Artificial Intelligence and Cybersecurity
The Rational Approach to Disruptive Information Security
Data Management - NA CACS 2009
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Continuous PCI and GDPR Compliance With Data-Centric Security
Opportunities with data science
Information Security For Small Business
The good, the bad and the ugly of the target data breach
Cyber Risk Management in 2017 - Challenges & Recommendations
Security, Audit and Compliance: course overview
Cyber Risk Management in 2017: Challenges & Recommendations
10 Steps for Taking Control of Your Organization's Digital Debris
Information security for small business
Slides to the online event "Creating an effective cybersecurity strategy" by ...
[Webinar Slides] From ECM to Intelligent Information Management
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Cloud & Sécurité
Real-World Data Science (Fraud Detection, Customer Churn & Predictive Mainten...
2015 KSU So You Want To Be in Cyber Security
Artificial Intelligence and Cybersecurity
Ad

Recently uploaded (20)

PPTX
Amazon (Business Studies) management studies
PDF
IFRS Notes in your pocket for study all the time
PPT
Chapter four Project-Preparation material
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
A Brief Introduction About Julia Allison
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPT
Data mining for business intelligence ch04 sharda
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Amazon (Business Studies) management studies
IFRS Notes in your pocket for study all the time
Chapter four Project-Preparation material
HR Introduction Slide (1).pptx on hr intro
Lecture (1)-Introduction.pptx business communication
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
A Brief Introduction About Julia Allison
340036916-American-Literature-Literary-Period-Overview.ppt
Tata consultancy services case study shri Sharda college, basrur
Power and position in leadershipDOC-20250808-WA0011..pdf
Euro SEO Services 1st 3 General Updates.docx
COST SHEET- Tender and Quotation unit 2.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Laughter Yoga Basic Learning Workshop Manual
Probability Distribution, binomial distribution, poisson distribution
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Data mining for business intelligence ch04 sharda
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Ad

Editor's Notes

  • #2: Presented at SecureWorld Expo by Ravila White
  • #5: Let’s discuss the current state of affairs facing information security architects. A point to note is use of the word enterprise has been mostly removed in their presentation. If you are an architect, you are more than likely in an environment that requires and currently utilized enterprise solutions.
  • #12: Orange book – no floppy protection Morris Worm – first time someone is prosecuted in the states for an internet threat, no international laws Laptops – not addressed in BS7799 Internet Consumerization – firewalls move from segregating internal networks to protecting a business from others on the internet E-commerce – compliance standards for credit cards such as VISA Cisp