Skip to main content

Home/ Groups/ NBISE Institute
Michael Assante

Enhancing the Cyber Workforce - 1 views

  •  
    Our IEEE paper on workforce development
Michael Assante

App security testing - 0 views

  •  
    About application security testing
dhtobey Tobey

TheBrain :: TeamBrain - 1 views

  • TeamBrain It's time to collaborate.  Learn how to grow your ideas and streamline projects with your peers.
  •  
    Check out this video tutorial! Should we consider adding The Brain to our NBISE Institute Community Desktop? Steve, I'd like to hear from you how this might be integrated into the tabbed page structure and KE. Mike, what do you think about using Brain for shared mindmapping in lieu of MindManager since our Catalyst license expired and Brain is much more cost effective. We could still attach MindManager files to nodes in The Brain for sharing of more static mindmaps. Just a thought...
dhtobey Tobey

Competency Data For Training Automation.pdf - 0 views

  •  
    Great white paper from which we borrowed the SCORM graphic.
dhtobey Tobey

2011 DHS S&T CSRD BAA - Federal Business Opportunities: Opportunities - 0 views

  • The Department of Homeland Security (DHS) Science and Technology (S&T) Homeland Security Advanced Research Projects Agency (HSARPA) Cyber Security Division's (CSD) announce a Broad Agency Announcement (BAA) for Fiscal Year 2011 to improve the security in both Federal networks and the larger Internet. This Broad Agency Announcement (BAA) seeks ideas and proposals for Research and Development (R&D) in 14 Technical Topic Areas (TTAs) related to CSD.
dhtobey Tobey

European e-Competence Framework - Home - 0 views

  • The European e-Competence Framework (e-CF) is a reference framework of 36 ICT competences that can be used and understood by ICT user and supply companies, the public sector, educational and social partners across Europe.
  • European e-Competence Framework 2.0 for download
  • European e-Competence Framework 2.0 - downloadUser guidelines for the application of the European e-Competence Framework 2.0 - downloadBuilding the e-CF - a combination of sound methodology and expert contribution - downloadEuropean e-Competence Framework 2.0 - Executive overview - download
  • ...2 more annotations...
  • European e-Competence Framework 2.0 - downloadUser guidelines for the application of the European e-Competence Framework 2.0 - downloadBuilding the e-CF - a combination of sound methodology and expert contribution - downloadEuropean e-Competence Framework 2.0 - Executive overview - download
    • dhtobey Tobey
       
      This is an example of how we might publish our Competency Model for Operational Security Testing.
dhtobey Tobey

Home - Performance Testing Council - 0 views

  • The Performance Testing Council is your gateway to freely exchange experiences, knowledge, and yes, passion with others in the practice of performance testing. Membership will help you refine your evaluation program as you learn from experts, share best practices, help define research, expand your marketplace and help establish common delivery standards.
  •  
    Community of interest group for performance testing
dhtobey Tobey

Outgunned: How Security Tech Is Failing Us -- InformationWeek - 0 views

  • "Years ago when we started writing checks, we might have been tackling five to 10 a day," says Paul Wood, a senior analyst with Symantec Hosted Services. "It's now well over 10,000 a day and growing." According to McAfee's 2010 Q2 Threat Report, the company identified 10 million pieces of malware in the first half of this year and is tracking close to 45 million in its malware database.
  • Vulnerability assessment products are also behind the curve, as Greg Ose and Patrick Toomey, both Neohapsis application security consultants, found when they recently set out to measure the relative effectiveness of various vulnerability scanners. "It's a question frequently raised by our customers," Toomey says. "They know the tools aren't going to catch all of the problems, but can they count on them to catch, say, 80% of the bad ones?" What Ose and Toomey discovered was far worse than even they had anticipated. Out of the 1,404 vulnerabilities accounted for by the Common Vulnerabilities and Exposures project during the sample period, there were only 371 signatures. In the best cases, the tools were in the 20% to 30% effectiveness range.
  • Toomey's observations are in line with those of security researcher Larry Suto, who earlier this year reported that Web application vulnerability scanners missed almost half (49%) of the vulnerabilities present during his tests.
  • ...5 more annotations...
  • But there's also a new twist to consider: With an increased number of attackers targeting and hijacking the credentials of IT personnel, the outsider can become the insider, at least from the perspective of our technology controls. Forward-thinking companies will move now to address this scenario. Think about how you'll detect large, anomalous query spikes against key tables in sensitive databases. Ensure you can spot large-scale document downloads from file shares and internal document management systems. If a hijacked credential is used to log into a large number of machines during a short time frame, you should have the ability to spot that activity.
    • dhtobey Tobey
       
      Investing in workforce development and professionalizatino of the infosec workforce may do more.. combat ingenuity with ingenuity, not automation.
  • investing even a small percentage of your security budget in only a few specialized systems to help here will go further than throwing good money at yesterday's outdated controls.
  • Stop rewarding ineffectiveness and start rewarding innovation. Maybe right now you're struggling with a scary realization: "The millions I'm spending on firewalls and antivirus technology is relatively worthless if my adversary is skilled."
  • Greg Shipley is an InformationWeek contributor and a former CTO
dhtobey Tobey

Security Training, CEH, Ethical Hacking, Penetration Testing, Certified Ethical Hacker,... - 0 views

  •  
    Potential partner in developing and distributing assessments targeting the entry level of operational security testing.
dhtobey Tobey

GIAC Security Expert (GSE) - 0 views

  •  
    Potential source of Competency Model Development Panel members.
dhtobey Tobey

Skills Framework for the Information Age - 0 views

  • The Skills Framework for the Information Age (SFIA) provides a common reference model for the identification of the skills needed to develop effective Information Systems (IS) making use of Information Communications Technologies (ICT). It is a simple and logical two-dimensional framework consisting of areas of work on one axis and levels of responsibility on the other.
  • SFIA enables employers of IT professionals to carry out a range of HR activities against a common framework of reference - including skill audit, planning future skill requirements, development programmes, standardisation of job titles and functions, and resource allocation.
  •  
    European initiative to catalog and rank information technology skills
‹ Previous 21 - 31 of 31
Showing 20 items per page