This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:OWASPhilly.pdf

From OWASP
Jump to: navigation, search
OWASPhilly.pdf(file size: 4.15 MB, MIME type: application/pdf)

Synopsis: For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support. In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current16:15, 24 May 2011 (4.15 MB)Aaron.weaver2 (talk | contribs)Synopsis: For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify poin
  • You cannot overwrite this file.

There are no pages that link to this file.