Integrate enterprise disciplines to achieve secure solutions
edit
Interpreting security requirements and goals to communicate with other disciplines
edit
Provide guidance and recommendations to staff and senior management on security processes and controls
edit
Establish effective collaboration within teams to implement secure solutions
edit
Database administrator
edit
Network administrator
edit
Emergency response team
edit
Physical security manager
edit
Explain the security impact of inter-organizational change
edit
Security concerns of interconnecting multiple industries
edit
Rules, policies and regulations
edit
Design considerations during mergers, acquisitions and de-mergers
edit
Assuring third party products - only introduce acceptable risk
edit
COTS – Commercial Off The Shelf Software
edit
Network secure segmentation and delegation
edit
Integration of products and services
edit
Select and distinguish the appropriate security controls with regard to communications and collaboration
edit
Unified communication security
edit
Enterprise configuration management of mobile devices
edit
Secure external communications
edit
Prioritizing traffic (QoS- Quality of Service)
edit
Smart phones, IP cameras, laptops, IP based devices
edit
Federated identity management (SAML--Security Assertions Markup Language)
edit
XACML- eXtensible Access Control Markup Language
edit
SOAP-Simple Object Access Protocol
edit
SPML- Service Provisioning Markup Language
edit
Certificate based authentication
edit
Carry out security activities across the technology life cycle
edit
End to end solution ownership
edit
Understanding results of solutions in advance
edit
Operational activities
edit
General change management
edit
Systems Development Life Cycle
edit
Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL)
edit
Security Requirements Traceability Matrix (SRTM)
edit
Adapt solutions to address emerging threats and security trends
edit
Validate system designs
edit