Outline:

  • Information centric and people centric security
  • Revisiting identity and access management
  • Cryptographic controls risk analysis
  • What should CISOs focus on to ascertain data owners' confidence in information systems and maintain proactive nature of information security management?
  • What aspects of information security management process cannot be outsourced in order to remain in control of data ownership?
  • Holistic approach to information system audit (auditing application, infrastructure, and process) - case study: Geneva e-voting system

Presentation slides: How to Maintain Proactive Security in the Post-"Heartbleed" "Shell Shock" World?