Director of Cyber Services CyberArch LLC, United States
This session will cover basic definition and typical implementation cases for security gap analysis and value proposition, as typically employed. The session will then provide examples and the value proposition for integrating security gap analysis as early as possible into the system development lifecycle. The session will have a focus on practical approaches to security gap analysis feeding the system requirements management process, risk assessments, and the implementation of security controls into system design.
Learning Objectives:
Identify practical techniques for security gap analysis during system design and development
Utilize security gap analysis to derive security controls for system design.
Feed risk assessments from security gap analysis information.