Developing Software Security Industry Tools

Slides:



Advertisements
Similar presentations
Providing Inspection Services for Department of Education Department for Employment and Learning Department of Culture, Arts and Leisure An evaluation.
Advertisements

Research and Doing a Phd
Capitalising the full potential of on-line collaboration for SME innovation support H2020-INNOSUP Context and Objectives Info-session Brussels,
Winnipeg Invitational Basketball Tournament “Plugged” Technical Vocational High School 1555 Wall Street, Winnipeg MB R3E 2S2 CANADA.
Algonquin College Technical Writer program priority: developing links with local industry The new programs Two kinds of links: – finding sites for student.
Spring 2003, IEOR Experience and Interface Design For Engineers A New Engineering Direction Mohsen Ashraf Alice ChenJake Gessin Milan Lee Angela.
IT Job Roles Task 20. Software Engineer Job Description Software engineers are responsible for creating and maintaining software of various different.
VisaPro Services Pvt. Ltd.. THE COMPANY VisaPro Immigration Services LLC, USA –US based immigration law firm –Offices in US and India.
Computer Science Studies and Distance Education Unique Aspects Wingate Seminar London May 2005.
Penetration Test
 Day 59 Computer Science and Industry Exploring The Intersection Between CS and Other Fields.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
3D Animation For this presentation I’ve decided to look at 3D Animation. This style of design has really grabbed my attention in the past couple of months.
 The Business Education Department of Pasco High School needs a 3D curriculum that guide/support a diverse group of students to meet the demanding skills.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
CHARACTERISTICS IN A WORKPLACE By Rahmi Hossain. ORGANISATION Time Management Dedication Good Teamwork Good Attitudes Good communication skills Confidence.
Education Transform Resources
Using Blackboard as a Tool to Teach Online Technology Skills in College Classrooms Dr. Victoria Haddad Adjunct Professor, College of Technology Wilmington.
© Copyright Richard Dealtry th & 10 th February 2012 Revolutionary Corporate University Forum Web:
Q Education Transform Resources. Intel® is Committed to Transforming Education for the Next Generation Intel supports education transformation 
MProf Games Development Professional Placements CASE STUDY A core philosophy within the MProf in Games Development is that of live project experience,
Surf smart training.
What is: Information & Communications Technology
Introduction : IT for Design
COLLABORATIVE PROBLEM-SOLVING
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Getting in to Creative and Digital Technology
ePortfolio and Online Presence: A Graduate Student Perspective
Abertay Enterprise Framework – business awareness beyond subject learning By Nuno Arroteia Claire MacEachen.
Dr. Kamal M. Kakish Dr. Yaquan Xu
‘Experience Your Future’ Job Shadowing Program
Computing & Information Communication Technology
Characteristics in a workplace
Associate Degree in Cyber security
Application of a Quantitative Methods degree within Industry
Avoid visual cliches. Solve problems typographically. Make it special AND businesslike.
The Greater Manchester Choices show offers a great range of resources and opportunities for teachers and education professionals to improve their knowledge.
An introduction to Businessline
A Level Information Communication Technology AQA (2520)
JanuSolve Digital Financial Services Opportunities.
From Fan To Pro: Using Your Hobbies in Your Career
Microstrategy Training In Hyderabad Microstrategy Training In Hyderabad.
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CYBER SCHOOL & SERVICES
CCA Sophomore Audits Class of 2020
CyberPaths Interdisciplinary Modules
Hailey Smith’s Career Path
Entrepreneurial University Leaders Programme
Using Microsoft LiveMeeting to Teach Online
Information Technology (IT)
What are your Career Options?
Monday 9th April – Friday 13th April 2018
Log on to a computer using your FZ username and password!
Professional Masters employer engagement and curriculum development in games and digital arts Professor Gregor White Head of School of Arts, Media and.
I UNDERSTAND CONCEPTS OF CYBERSECURITY
CCA Sophomore Audits Class of 2021
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
TITLE: MY REFLECTIONS ON SEMESTER 1 OF THE MSc CMCP COURSE AT THE UNIVERSITY OF MAURITIUS PRESENTED BY: UDHIN WAAIZA DATE: 7TH DECEMBER 2004.
The CYBERWISER.eu project
A Big Thank-You From Troop Athena.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Choosing the Right Postgraduate Course for You
ETHICS FOR IT WORKERS AND IT USERS 1 Rifat al mamun Roll : Presented by.
OU BATTLECARD: Oracle Identity Management Training
Computer Science Dr Hwang Chair, Computer Science Department
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Developing Software Security Industry Tools STUDENT FEEDBACK Samantha Beaumont “Having a sponsor who suggested a topic of real relevance to current industry is extremely beneficial to me as a student just entering this field, as I have more of a realistic perspective regarding research topics and responsibilities demanded from an individual entering an unknown space within the community.” CASE STUDY “Graphic Visualisation of the weakest link attack surfaces of a given online individual or enterprise ecosystem” The aim of the project to produce a tool which provides an interface for end-users to calculate their digital footprint and produce a graph which visually dictates the paths of least resistance within their use network which would be used for maximum exploitation in the case of a worst case scenario exposure. The student has been given full reign over the direction of the project while the project supervisor at Abertay has advised on the scope of the project and offered assistance with academic matters. The company, Cigital, have also been available to offer both general and sometimes more specific advice regarding technological or mathematical matters. PROJECT SUPERVISOR Dr Natalie Coull School of Arts, Media & Computer Games Abertay University I really enjoy supervising students who are working on industry based projects. It’s great to see the students growing in confidence as they realise through the project how the skills they’ve learned at university can be relevant in an industrial context, and get an insight into the issues that companies are trying to tackle in the field of ethical hacking. From my own perspective, it’s also invaluable to work (albeit virtually) along side a company to supervise a student and gain a better understanding of the company profile and their goals. I can use this to inform my own teaching and research. EMPLOYER INFORMATION Cigital Cyber Security Company “Cigital takes a holistic approach to designing, building and maintaining secure software—a concept we call ‘Building Security In.’ To accomplish this, Cigital offers a comprehensive portfolio of solutions delivered through managed services, professional services, and products. These solutions range from end-to-end application security programs to threat modeling to training. We believe that finding bugs is only a part of the application security process. We place the emphasis where it belongs: collaborating with our clients to fix their vulnerabilities and prevent security issues before they occur. Cigital has the people, processes, policies and tools to make any security journey a success”d the website www.masterprojects.ac.uk