edit

Perform on-going research

edit

Best practices

edit

New technologies

edit

New security systems and services

edit

Technology evolution (e.g. RFCs, ISO)

edit

Situational awareness

edit

Latest client-side attacks

edit

Threats

edit

Counter zero day

edit

Emergent issues

edit

Research security implications of new business tools

edit

Social media/networking

edit

Integration within the business (e.g. advising on the placement of company material for the general public)

edit

Global IA industry/community

edit

Conventions

edit

Attackers

edit

Emerging threat sources

edit

Research security requirements for contracts

edit

Request for Proposal (RFP)

edit

Request for Quote (RFQ)

edit

Request for Information (RFI)

edit

Agreements

edit

Carry out relevant analysis for the purpose of securing the enterprise

edit

Benchmark

edit

Prototype and test multiple solutions

edit

Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO)

edit

Analyze and interpret trend data to anticipate cyber defense aids

edit

Review effectiveness of existing security

edit

Reverse engineer / deconstruct existing solutions

edit

Analyze security solutions to ensure they meet business needs

edit

Specify the performance

edit

Latency

edit

Scalability

edit

Capability

edit

Usability

edit

Maintainability

edit

Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure)

edit

Conduct a lessons-learned / after-action review

edit

Use judgment to solve difficult problems that do not have a best solution

edit

Conduct network traffic analysis

edit