CASP/Integration

Integrate enterprise disciplines to achieve secure solutions edit

Interpreting security requirements and goals to communicate with other disciplines edit

Programmers edit

Network engineers edit

Sales staff edit

Provide guidance and recommendations to staff and senior management on security processes and controls edit

Establish effective collaboration within teams to implement secure solutions edit

Disciplines edit

Programmer edit

Database administrator edit

Network administrator edit

Management edit

Stake holders edit

Financial edit

HR- Human Resources edit

Emergency response team edit

Facilities manager edit

Physical security manager edit

Explain the security impact of inter-organizational change edit

Security concerns of interconnecting multiple industries edit

Rules, policies and regulations edit

Design considerations during mergers, acquisitions and de-mergers edit

Assuring third party products - only introduce acceptable risk edit

Custom developed edit

COTS – Commercial Off The Shelf Software edit

Network secure segmentation and delegation edit

Integration of products and services edit

Select and distinguish the appropriate security controls with regard to communications and collaboration edit

Unified communication security edit

Web conferencing edit

Video conferencing edit

Instant messaging edit

Desktop sharing edit

Remote assistance edit

Presence edit

Email edit

Telephony edit

VoIP security edit

VoIP implementation edit

Remote access edit

Enterprise configuration management of mobile devices edit

Secure external communications edit

Secure implementation of collaboration platforms edit

Prioritizing traffic (QoS- Quality of Service) edit

Mobile devices edit

Smart phones, IP cameras, laptops, IP based devices edit

Explain advanced authentication tools, techniques and concepts edit

Federated identity management (SAML--Security Assertions Markup Language) edit

XACML- eXtensible Access Control Markup Language edit

SOAP-Simple Object Access Protocol edit

Single sign on edit

SPML- Service Provisioning Markup Language edit

Certificate based authentication edit

Attestation edit

Carry out security activities across the technology life cycle edit

End to end solution ownership edit

Understanding results of solutions in advance edit

Operational activities edit

Maintenance edit

Decommissioning edit

General change management edit

Systems Development Life Cycle edit

Security System Development Life Cycle (SSDLC) / Security Development Life Cycle (SDL) edit

Security Requirements Traceability Matrix (SRTM) edit

Adapt solutions to address emerging threats and security trends edit

Validate system designs edit