4. Security Planning

4. Security Planning

I have successfully led a team, prepared and completed coursework and presented to ~40 people on the following topics:


Network Fundamentals

IP addresses (v4 + v6) and classes, subnetting, TCP/IP, ports, DNS, Wireshark, PCAP Forensics, topologies, OSI model, wireless and mobile networks (MDM/BYOD). Virtualisation and virtualised networks.


Operating Systems

Specifically their vulnerabilities and attack prevention. Horizontal and vertical attacks, system patches and firewalls, authentication, maintenance, DoS and DDos attacks, buffer overflow, memory corruption, RCE.


Application Security

Whole lifecycle approach to securing software (SDLC and SSDLC). Development, testing, deployment, maintenance and improvement, requirement definition. Threat modelling, code inspection, configuration management, pen testing and vulnerability management. Security architecture principles, PDCA, Deming cycle.


Governance, Laws and Policy

Detailed look at laws, regulations and standards, data classification and lifecycles, policy, process, GDPR, decommissioning, ISO27001:2022 (including BSI exam passed).


Outsourcing And Supply Chain

Connections within the supply chain from manufacturer to customer. Data protection, data location, classification and control. Applicable laws, regulations and governance. Fraud prevention as data moves between systems/formats. Audit, 3rd party risks.


Audit

Purpose of audits (certification, surveillance, compliance, gap analysis etc) and how to conduct them. Including observations, areas for improvement, minor and major non-compliance, indications of severity, recommendations. Impact and severity assessment, remediation planning, risk appetite, budget etc.


Security Architecture

Aligning solutions to frameworks, security controls, business requirements, end to end security. Use of RACI diagram. Differing security models (e.g.DiD, Castle and Moat, Layered etc.)



Share by: