COSAC Security Conference
COSAC Security Conference
  • 14
  • 11 081
Maturity Models: Mysteries, Pitfalls & Reality - COSAC Connect #2
There are wide variety of methods and supporting mechanisms to conduct maturity assessments that have varying results. This session will provide an overview of the various methods and mechanisms and describe many of the typical pitfalls and potential solutions to arrive at results that are actually understandable, meaningful and repeatable. We will have a look at the various reference standards and maturity scales from ISO, NIST, CMMC, ISF, CMMI, and several others typically used to assess maturity. Is a maturity assessment the same or comparable to assessing implementation tiers? How to you measure the effectiveness of the controls and processes and the risk associated with the various levels of maturity? The objective of the session is to strip away the mystery and magical thinking that tends to creep into maturity assessments and provide information that can be used to establish realistic expectations and beneficial results.
Presenter: Glen Bruce - Director, Deloitte (Canada)
Переглядів: 223

Відео

Imposter Syndrome & Overconfidence - COSAC Connect #2
Переглядів 773 роки тому
Humans are often referred as the weakest link in security, but competent and motivated humans can also be the strongest asset for security management. Much depends on how the context enables and empowers the individuals, but naturally also the characteristics and attitudes of individuals have a significant impact on security. Presenter: Helvi Salminen - Security Advisor (Finland)
Adapting to New Normals - How to Architect for Ever-moving Goalposts - COSAC Connect #2
Переглядів 7813 роки тому
Future success depends upon an Enterprise’s ability to understand complexity, be resilient to complex disruption, and adapt to ever-changing complex requirements. The question is “How?”. Even if we prioritise with a risk-driven approach, there are far too many high priorities and far too few resources for us to succeed before the goalposts move again. Presenter: David Lynas - CEO, David Lynas C...
AI and ML: Security and the Science (Fiction?) - COSAC Connect #2
Переглядів 863 роки тому
A discussion of security through the lens of ML - the algorithms that help us find the patterns in data, detection of anomalies and underpin the self-healing of systems - and the future of Artificial Intelligence with all it’s potential for both harm and good. We’ll touch on present-day use of ML in security including big data and integrated signals, data gravity, adversarial ML and threat kill...
Welcome to COSAC Connect #2
Переглядів 1283 роки тому
The second iteration of COSAC Connect, our free virtual information security conference took place on 11th August 2021. View the welcome session from COSAC Chair, David Lynas.
Rise of The Weird Machines - COSAC Connect #1
Переглядів 1184 роки тому
One of the key assumptions in programming is that computers execute code that performs the function intended by the programmer. However, as programs become more complex, so do their inputs - giving rise to situations where specially-crafted data can trigger unexpected computations in targets ranging from executables to OS elements to embedded hardware. These "weird machines" give rise, then, to...
SA B[S]Akery: The Story of ESA Architects Turned Bakers - COSAC Connect #1
Переглядів 4054 роки тому
Creating security architecture for a real-life organization can be a daunting task. As we model all aspects of the business, our diagrams grow more complex and we need longer to move through the architectural layers. It could help budding architects to first apply SABSA to a very simple situation before moving into real-life territory. Enter SA B[S]Akery. The goal of this session is to show how...
Speaking Security Innovation Fluently: Taking ESA From Boardrooms to Lego Rooms - COSAC Connect #1
Переглядів 1194 роки тому
Global and local enterprises are all pushing ‘innovation’ mantras, from Agile-IT or Netflix-HR. The rush towards decentralized-small-squad-self-governed-code-fast-publish-now-fail-early-apologize-later-if-needed (Agile, DevOps, etc) place known and growing challenges to ESA. Design Think: Hasso-Plattner; radical-collaboration, bias-toward-action, mindful-of-process, beginners-mindset, show-don’...
Digital Ethics: A Blueprint for the Future - COSAC Connect #1
Переглядів 674 роки тому
Digital ethics, together with privacy, was one of Gartner’s top ten strategic technology trends. In the world of Cybersecurity, we are acutely aware of what privacy means but are we so clear about digital ethics? The current discourse on digital ethics focusses either on the intended ethical breaches resulting in damage to consumer trust - in other words ‘not doing right’ or on the potential mi...
Securing The Digital Transformed World - COSAC Connect #1
Переглядів 1504 роки тому
As organisations go through digital transformation Cybersecurity practices need to evolve to keep up. This session explores some of the challenges and approaches to evolving security risk management to unlock the opportunity of digital transformation by managing and mitigating some of the threats. Topics include: -Changing control and risk frameworks - and reporting on risk to support digital t...
Using SABSA to Architect Zero Trust Networks - COSAC Connect #1
Переглядів 7 тис.4 роки тому
In 2014, Google threw away its traditional approach to securing its services and reimagined what security should look like to be truly effective in today's world of distributed teams, systems, and applications. But is it practical for an organisation without the resources of Microsoft, Amazon Web Service and Google to adopt these concepts? This session will provide a brief overview of the zero-...
Dependency Modelling in SABSA: Dynamically Visualising Risk - COSAC Connect #1
Переглядів 1,2 тис.4 роки тому
Dependency modelling is a way of analysing risks to an enterprise.  It uses a variety of different approaches to describe and predict how different systems components interact and interdepend.  Typically it provides graphical representations of these relationships that help systems engineers design and implement resilient systems. The goal is to use Dependency Modelling within SABSA to make the...
Welcome to COSAC Connect #1
Переглядів 1984 роки тому
COSAC Security conference went virtual for the first time in 2020 with COSAC Connect. View our virtual conference arrival and welcome speech from COSAC Founder & Chairman David Lynas.
Welcome to COSAC Security Conference
Переглядів 1184 роки тому
In 2018, we wanted to tell the world a little more about what it's really like to attend COSAC information security conferences. Hear from some of our delegates and get a sneak peak around the venue for our annual event in Ireland.

КОМЕНТАРІ

  • @davenddominick
    @davenddominick 11 місяців тому

    The theoretical question's answer this assumes that no communication can take place on a layer 2.

  • @stuartmcgowan5970
    @stuartmcgowan5970 11 місяців тому

    Three years later, I'm wondering, was a SABSA working group ever setup to develop tooling for risk-based dependency modelling?

  • @t0day
    @t0day Рік тому

    Congrats, more power 🇵🇭