2012.0×0005 (May)
May Meeting details
Speaker: Auston Holt “c3llardoor”
Deputy CISO, atsec information security corporation
Topic: Security-Sanctification
Date: May 4th, 2012
Time: 12:00 – 1:00 p.m. with introductions beginning at 11:30 a.m.
Venue: Microsoft Technology Center at Quarry Oaks 2.
Address: 10900 Stonelake Blvd. Suite 225. Austin, TX 78759
Synopsis:
Application security evaluation approaches have come in many forms over the years from United State’s Rainbow Series to Europe’s Information Technology Security Evaluation Criteria (ITSEC). The current mutually accepted world wide standard for application security evaluation is the Common Criteria for IT Security Evaluation.The Common Criteria’s highest defined level of assurance, evaluation assurance level seven- “Formally Designed and Tested,” will be discussed including a brief touch on all areas of the total package. Applying this model to our life, we’ll discuss how hard one needs to work to attain formal verification that our current design in life is bringing us ultimate security.
Application security evaluation approaches have come in many forms over the years from United State’s Rainbow Series to Europe’s Information Technology Security Evaluation Criteria (ITSEC). The current mutually accepted world wide standard for application security evaluation is the Common Criteria for IT Security Evaluation.The Common Criteria’s highest defined level of assurance, evaluation assurance level seven- “Formally Designed and Tested,” will be discussed including a brief touch on all areas of the total package. Applying this model to our life, we’ll discuss how hard one needs to work to attain formal verification that our current design in life is bringing us ultimate security.
Speaker Bio:
