Integrate enterprise disciplines to achieve secure solutions
edit
Interpreting security requirements and goals to communicate with other disciplines
edit
Programmers
edit
Network engineers
edit
Sales staff
edit
Provide guidance and recommendations to staff and senior management on security processes and controls
edit
Establish effective collaboration within teams to implement secure solutions
edit
Disciplines
edit
Programmer
edit
Database administrator
edit
Network administrator
edit
Management
edit
Stake holders
edit
Financial
edit
HR- Human Resources
edit
Emergency response team
edit
Facilities manager
edit
Physical security manager
edit
Explain the security impact of inter-organizational change
edit
Security concerns of interconnecting multiple industries
edit
Rules, policies and regulations
edit
Design considerations during mergers, acquisitions and de-mergers
edit
Assuring third party products - only introduce acceptable risk
edit
Custom developed
edit
COTS – Commercial Off The Shelf Software
edit
Network secure segmentation and delegation
edit
Integration of products and services
edit
Select and distinguish the appropriate security controls with regard to communications and collaboration
edit
Unified communication security
edit
Web conferencing
edit
Video conferencing
edit
Instant messaging
edit
Desktop sharing
edit
Remote assistance
edit
Presence
edit
Telephony
edit
VoIP security
edit
VoIP implementation
edit
Remote access
edit
Enterprise configuration management of mobile devices
edit
Secure external communications
edit
Secure implementation of collaboration platforms
edit
Prioritizing traffic (QoS- Quality of Service)
edit
Mobile devices
edit
Smart phones, IP cameras, laptops, IP based devices
edit
Explain advanced authentication tools, techniques and concepts
edit
Federated identity management (SAML--Security Assertions Markup Language)
edit
XACML- eXtensible Access Control Markup Language
edit
SOAP-Simple Object Access Protocol
edit
Single sign on
edit
SPML- Service Provisioning Markup Language
edit
Certificate based authentication
edit
Attestation
edit
Carry out security activities across the technology life cycle
edit
End to end solution ownership
edit
Understanding results of solutions in advance
edit
Operational activities
edit
Maintenance
edit
Decommissioning
edit
General change management
edit
Systems Development Life Cycle
edit
Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)
edit
Security Requirements Traceability Matrix (SRTM)
edit
Adapt solutions to address emerging threats and security trends
edit
Validate system designs
edit