Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel

This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. In this session, industry security expert Gunnar Peterson develops a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks. Then to deal with injection and snooping threats, Gunnar outlines content validation and encryption controls that must be applied. Following Gunnar, Intel shows how an Architect can decouple security logic from application servers to create, manage and enforce security policies using a Service Gateway.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Intel
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement