Evaluating the Security of Potential Partners …Without Permission
80 Slide Presentation
Check out Project Manager Jonathan Lampe’s “Secure Tomorrow Today” presentation from (ISC)2 Security Congress 2015 conference. The presentation is titled “Evaluating the Security of Potential Partners …Without Permission”. Click the button below to download the presentation and follow along.
[download] CLICK HERE TO DOWNLOAD [/download]
Jonathan Lampe
Jonathan Lampe, CISSP has led the development of award-winning security software and supporting services for Standard Networks, Ipswitch, and SolarWinds. He holds computer science and business degrees from Northern Illinois University and the University of Wisconsin, and currently holds SANS GSNA and CCSK certifications in addition to his (ISC)2 credentials. When not coding, hacking, or writing, Lampe likes to spend time with his family in the beautiful Wisconsin outdoors.
- Evaluating the Security of Potential Partners …Without Permission
- SonarQube: A Hidden Gem
- Categorizing the Types of GNU/Linux users
- Security in Projects: The Importance of Effective Social and Soft Skills
- Career Opportunities at Stroz Freidberg
- An Introduction to Linux Commands in Kali
- Introduction to IT Security & Computer Forensics
- 3 Cyber Threats, One Simple Solution
- Common Linux Misconfigurations
- Regulators Protect Their Data: Who’s Protecting Yours?
- SCA, For a Secure SDLC
- w3af Tutorial
- We’re Hiring: Information Technology Instructor for Online Programs
- Threat Modeling – Finding defects early in the cycle
- Implementing Secure Software Development Program
- Book Excerpt: Information Warfare on an Evolving Battlefield
- Fun with email headers
- The ideal method of team building
- Domain name parking of gTLDs
- Sniffing Network Traffic on Android
- The cyber attacks on Saudi Aramco, RasGas, and U.S. banks in the context of international law
- How to Filter User Input: An Overview
- Transfer mechanisms of personal data from EU to third countries
- Differences in Copyright Enforcement between the U.S. and China
- Biggest mistakes in UI and how to avoid them: Introduction & Websites UI
- A Final Word on Estimating Projects
- Android and Java Native Interface
- GETTING TO KNOW ARDUINO
- Estimating Projects Part III
- Low Fidelity Prototyping: The Cheapest Corrections in Design Stage Ever!
- Good Programming Techniques – Exceptions to Program, Part 2
- Computer Network Diagnostics Part 4
- The Most Common Problems in the Implementation of Agile Methodologies in Companies, Part 1
- Getting Domain Information
- Computer Network Diagnostics, Part 3
- Computer Network Diagnostics Part 2
- Understanding the 18+ Clicking Rage on Facebook: What Keeps Us Going?
- Can You Really Be Anonymous on the Internet?
- The Internet Underground: Tor Hidden Services
- Computer Network Diagnostics, Part 1
- Network Topology
- Q: A Collection of Metasploit Modules Not Accepted to Main Trunk for Various Policy or Quality Reasons
- Estimating Projects, Part II
- Estimating Projects, Part I
- Thoughts from My Three-Night Coding Excursion: Part 2 – Design in C#
- Thoughts from My Three-Night Coding Excursion: Part 1 – Design Principles
- Human Resource Management in Agile – Part 6
- Human Resource Management in Agile – Part 5
- Surviving a Hacker Conference and an Infosec Gathering 101
- InfoSec Institute is hiring: Content Acquisition Manager
- Backups. What will happen to your data?