Maturing 3rd Party Vendor Risk Programs presented at The Hobart Room, San Francisco, CA during the RSA Conference on March 1, 2016.
This presentation discusses the basics of cyber liability insurance and relevant case laws.
Waypoint – a threat modeling tool intended to help developers and architects consider possible threat scenarios to their application environments.
Geopolitical Risk Simulation
An interactive simulation was designed and facilitated for a US company exploring entry into the cryptocurrency sector to understand the steps involved and explore potential regulatory changes that could affect operations.
Geopolitical Risk Assessment
Assessment of risks related to modernizing the telecommunications industry in Iran, following the anticipated removal of sanctions.
CSX North America Conference, October 2015 discusses how risk centric threat modeling can help unify disparate security efforts.
HIPAA Security Rule
This presentation discusses healthcare threat modeling with risk-centric approaches, which took place at ISC2/ASIS International 2015 Security Conference.
The retention of medical records is, unfortunately, not a cut and dry sentence highlighted in the opening paragraph of HIPAA. There are several factors to consider when determining what documents need to be stored and for how long. It is important to realize that HIPAA makes no firm assertion as to medical records retention leaving the long-term storage of medical records to state and other federal laws.
This video is a demonstration of the command injection vulnerability in the WD My Cloud NAS. It shows that it is possible to remotely access every folder and file on the NAS regardless of permissions.
We are an international squad of professionals working as one.
Copyright 2020 VerSprite - All Rights Reserved