CASP/Integration

Integrate enterprise disciplines to achieve secure solutions

edit

Interpreting security requirements and goals to communicate with other disciplines

edit

Programmers

edit

Network engineers

edit

Sales staff

edit

Provide guidance and recommendations to staff and senior management on security processes and controls

edit

Establish effective collaboration within teams to implement secure solutions

edit

Disciplines

edit

Programmer

edit

Database administrator

edit

Network administrator

edit

Management

edit

Stake holders

edit

Financial

edit

HR- Human Resources

edit

Emergency response team

edit

Facilities manager

edit

Physical security manager

edit

Explain the security impact of inter-organizational change

edit

Security concerns of interconnecting multiple industries

edit

Rules, policies and regulations

edit

Design considerations during mergers, acquisitions and de-mergers

edit

Assuring third party products - only introduce acceptable risk

edit

Custom developed

edit

COTS – Commercial Off The Shelf Software

edit

Network secure segmentation and delegation

edit

Integration of products and services

edit

Select and distinguish the appropriate security controls with regard to communications and collaboration

edit

Unified communication security

edit

Web conferencing

edit

Video conferencing

edit

Instant messaging

edit

Desktop sharing

edit

Remote assistance

edit

Presence

edit

Email

edit

Telephony

edit

VoIP security

edit

VoIP implementation

edit

Remote access

edit

Enterprise configuration management of mobile devices

edit

Secure external communications

edit

Secure implementation of collaboration platforms

edit

Prioritizing traffic (QoS- Quality of Service)

edit

Mobile devices

edit

Smart phones, IP cameras, laptops, IP based devices

edit

Explain advanced authentication tools, techniques and concepts

edit

Federated identity management (SAML--Security Assertions Markup Language)

edit

XACML- eXtensible Access Control Markup Language

edit

SOAP-Simple Object Access Protocol

edit

Single sign on

edit

SPML- Service Provisioning Markup Language

edit

Certificate based authentication

edit

Attestation

edit

Carry out security activities across the technology life cycle

edit

End to end solution ownership

edit

Understanding results of solutions in advance

edit

Operational activities

edit

Maintenance

edit

Decommissioning

edit

General change management

edit

Systems Development Life Cycle

edit

Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)

edit

Security Requirements Traceability Matrix (SRTM)

edit
edit

Validate system designs

edit