Talk on creating a Security Coordination Center at CISO 360 Congress in Lisbon

For organizations with fragmented security operations, for example with one unit managing operations of perimeter network security another unit managing operations of end-point security and identities and third unit managing operations of applications and databases security, coordination of these functions is critical for effective and efficient Information Security […]

Teaching at University: CSSS 2510 Cyber Attacks and Defense (2018)

Webster University undergraduate catalog description: The course provides students with insight on common cyber-attacks and the techniques for identifying, detecting and defending against cybersecurity threats. The course will cover firewalls, intrusion detection/prevention, authentication, ciphers, cryptography, etc. The course presents emerging technologies such as virtualization, Cloud computing, and multimedia protocols. This course […]

Teaching at University: CSSS 2410 Cybersecurity and Internet architecture (since 2017)

Webster University undergraduate catalog description: This course will introduce the student to the field of cybersecurity and Internet architecture. The application, physical, link, network and transport layers of the protocol stack are presented. The student will study technologies, processes and practices designed to protect networks, computers, programs, and data from attacks. Cybersecurity […]

Information value

It is difficult to perceive risks and opportunities related to information if we cannot estimate its value. In this article I will try to present some approaches that could be used to estimate information value. The article is based on the presentation @ViktorPolic has given as a guest […]