Topics
Application Security
Mobile Application Security, Patch Management, Secure Coding, Web Application Security
Big Data
Database Security, Information Management
Cloud Security
Virtualization Security
Compliance
Audit, Governance Risk, Legislation and Standards, PCI-DSS, Regulation, Security Policy
Cybercrime
Advanced Persistent Threats, Cyber-criminals and Convictions, Phishing, Threat Intelligence, Unified Threat Management
Dark Web
Is part of the internet that isn’t visible to search engines and requires the use of an anonymity tool.
Data Protection
Data Breaches, Data Loss Prevention, Information Risk Management, Secure Disposal
Digital Forensics
Data Breach Incident Management, Fraud Detection, IT Forensics, Security Information and Event Management (SIEM)
Encryption
Digital Signatures and Certificates, PKI, SSH, SSL
Identity Access Management
Authentication Tokens, Biometrics, Digital Rights Management, Single Sign On, Two-Factor Authentication, Virtual Authentication
Internet Security
DDoS, Email Security, IM Security, Social Media Security
Malware
Anti‐Spam, Anti‐Virus, Ransomware
Mobile Security
BYOD, Mobile Access Management, Mobile Device Management, Tablet Security, VOIP Security
Network Security
Access Rights Management, End Point Security, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security
Privacy
Government Security, Suveillance
Risk Management
Risk and Vulnerability Assessment, Security Analytics, Vulnerability Management
Internet of Things
Network of devices such as vehicles, and home appliances that contain electronics, software, sensors, actuators, and connectivity which allows these things to connect, interact and exchange data.
Vulnerabilities
Software security flaw, Zero-Day, Exploits