Vulnerability researcher on layered security plan mistakes

According to Roger Johnston, head of the Vulnerability Assessment Team at Argonne National Laboratory, when seeking out vulnerabilities, instead of thinking like bad guys, enterprise information security teams should think like vulnerability assessors.

In this video interview conducted at the 2012 (ISC)2 Security Congress in Philadelphia, the vulnerability researcher explains the difference, and offers tips for working successfully with third-party vulnerability assessors. Johnston also discusses layered security and the dangers of putting a layered security plan in place without an analysis of how each layer affects the other layers.

View All Videos

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close