Feed on
Posts
Comments

Category Archive for 'Methodology'

Security and high costs

Many of us have seen and implemented different kind of security solutions. Some very cheap and others…more costly. One thing I teach all my colleagues, using Security Analysis Framework, is how to calculate the most economically viable solution for our client. It may seem to be rather easily using Return Of Security Investment (ROSI), but […]

Read Full Post »

If you have been with me the last years you probably know that I´m no fan of probability when it comes to risk analysis. Following this I invented a workshop methodology named Micro Risks a few years back. During the last weeks I have merged this with Bruce Schneier´s Attack Trees and put together a […]

Read Full Post »

You3 next level

You may probably have heard of You3 analysis model before. It used to be just a nice graphical tool for presentation of risks but the last two weeks I have spent some time to actually create an analysis model where the outcome is something very similar to the presentation model. Using it as a way […]

Read Full Post »

Several of you are surely using different payment services on internet where you could register your credit card and then use the service instead of putting your credit card at risk. It is also possible to accept payments using those sites but sometime there are mistakes made and the account is suspended. Such incidents are […]

Read Full Post »

Not taking the blame has always been a bit of a sport in some organisations. Some of you may have heard of RACI. In some assignments I have used an alternative named RACI-B where I added a column for Blamed. A perfect tool to use to handle the blame game that always follow a breach. […]

Read Full Post »

Having worked with security and compliance schemes for many years I still find it very challenging to motivate why a client should invest in fulfilling any type of compliance, besides the obvious one: You have to. But as everyone knows a rule consists of three parts: The rule, the monitoring of rule fulfillment and the […]

Read Full Post »

Quite often I am engaged in projects involving creating an information classification. Many times this is seen as security work. However, this is not the case. Information classification is only an economic construct. By classifying information you make it easier to decide what kind of security and which security mechanisms you need. What is then […]

Read Full Post »

Some of you may have noticed that my blog was hacked twice during February. The first hack was someone entering links for some obscure medical shop in all postings. The second hack was a simple defacing. You could say that it should be embarrassing to be hacked and that me as a security expert should […]

Read Full Post »

Why broad knowledge is important

I recently finished a study at a client that has a lot of electrical engineers. It was very interesting how they always tried to solve all problems with the tools at hand, mainly electrical components and power switches. The question was how to secure access to a workstation. Their solution was to cut the power […]

Read Full Post »

The science and politics of fear

I really love books and books that expand my knowledge in security are even better. As an old social worker I am quite skilled in psychology, sociology and especially crisis management. Reading “The science and politics of fear” is like standing with you head down, bending you neck upwards and for the first time see […]

Read Full Post »

« Prev - Next »