Agile security and risk management are possible. This post is the third of three covering agile security challenges, opportunities, and good practices. It also discusses the taxonomy and instrumentation required to operationalize an agile risk management framework down to the… Continue reading
Register here to see us on October 12 at the New York IAM Users Group where Dan Blum will speak on the meme “attributes are beautiful.”
Don’t get us wrong, the architecture in the picture isn’t for everyone and… Continue reading
Dan Beckett and Dan Blum from Security Architects Partners will be speaking at the Factor Analysis of Information Risk (FAIR) Institute Chicago Chapter meeting.
When: Thursday, October 5, 2017, 3:30 – 5 PM CDT
Where: Northern… Continue reading
We’re writing to share our news, and to update our newsletter subscribers on an improvement we’ve made to the distribution system.
News: We’re keeping busy with a mix of risk management program development, identity management, and data leakage prevention… Continue reading
Privacy-by-Design technical and business process engineering important for solving business GDPR compliance challenges. But the privacy issues and enforcement questions around GDPR are pretty complex. How should companies begin?
Dan Beckett will be speaking Thursday at the following event. If desired, please register with the Meetup group at this link.
DATE and TIME:
Thursday, August 17, 2017
3:30 PM to 6:30 PM
Dave and Buster’s
13857… Continue reading
Agile risk management – is it even possible? This is our second of two posts ruminating on agility versus security. Today, you’ll see that an agile risk management framework like the one in the figure below is feasible, and that… Continue reading
Agile security has emerged as a core topic for us in two cutting edge consulting engagements over the past few months.
The first of these engagements is to help a very large client develop and mature an enterprise risk management… Continue reading