Vulnerability researcher on layered security plan mistakes

According to Roger Johnston, head of the Vulnerability Assessment Team at Argonne National Laboratory, when seeking out vulnerabilities, instead of thinking like bad guys, enterprise information security teams should think like vulnerability assessors.

In this video interview conducted at the 2012 (ISC)2 Security Congress in Philadelphia, the vulnerability researcher explains the difference, and offers tips for working successfully with third-party vulnerability assessors. Johnston also discusses layered security and the dangers of putting a layered security plan in place without an analysis of how each layer affects the other layers.

View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.







  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...