Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
46 Riffat Muzamil A Framework for Assessing 20 Critical Controls Using ISO 15504 and COBIT 5 Process Assessment Model (PAM) GCCC Jul 06, 2015
4495 Belangia David Securing Single Points of Compromise (SPoC) GSNA Jun 30, 2015
242 Scott Austin Tactical Data Diodes in Industrial Automation and Control Systems GICSP Jun 30, 2015
21588 Jodoin Eric Accessing the inaccessible: Incident investigation in a world of embedded devices GCIH Jun 30, 2015
31978 Miller Marsha BYOD: Do You Know Where Your Backups Are Stored? GSEC Jun 30, 2015
153 Begin Francois eAUDIT: Designing a generic tool to review entitlements GCCC Jun 22, 2015
36744 Sanchez Gabriel Case Study: Critical Controls that Sony Should Have Implemented GSEC Jun 22, 2015
22339 Chua Zong Fu Using windows crash dumps for remote incident identification GCIH Jun 16, 2015
10551 Aydell Glenn The Perfect ICS Storm GCIA Jun 08, 2015
8708 Dittmer John Applying Lessons Learned for the Next Generation Vulnerability Management System GSLC Jun 08, 2015
9439 Nafziger Brian Practical Attack Detection, Analysis, and Response using Big Data, Semantics, and Kill Chains within the OODA Loop GCIA Jun 03, 2015
10377 Yeatman William Integration of Network Conversation Metadata with Asset and Configuration Management Databases GCIA May 26, 2015
16808 Imbert Courtney Knitting SOCs GCIH May 26, 2015
3382 Varga-Perke Balint Automated Security Testing of Oracle Forms Applications GWAPT May 26, 2015
36463 McCullough Shaun Lenovo and the Terrible, Horrible, No Good, Very Bad Week GSEC May 21, 2015
5882 Graves Rich Honeytokens and honeypots for web ID and IH GCIA May 14, 2015
8922 Allen Jon Mark IPv6 and Open Source IDS GCIA May 14, 2015
9991 Khalil George IDS File Forensics GCFA May 13, 2015
22279 Groombridge Kenton Nftables as a Second Language GSEC May 11, 2015
344 Shanks Wylie Building a Vulnerability Management Program - A project management approach GCPM May 11, 2015
19939 Eichelberger Florian Using Software Defined Radio to attack "Smart Home" systems GCIH May 01, 2015
35066 Simsay Jason Is It Patched Or Is It Not? GSEC Apr 23, 2015
2573 Bohio Muhammad Junaid Analyzing a Backdoor/Bot for the MIPS Platform GREM Apr 13, 2015
3029 Sylvander Harri XtremeRAT - When Unicode Breaks GREM Apr 09, 2015
654 Greenwell Matthew Defense-in-Policy begets Defense-in-Depth GCED Apr 03, 2015
35394 Sepe Ryan Denial of Service Deterrence GSEC Apr 01, 2015
524 Hoehl Michael Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud GLEG Apr 01, 2015
23150 Vedaa Charles Practical El Jefe GCIH Mar 31, 2015
858 Schum Chris Correctly Implementing Forward Secrecy GCIH Mar 30, 2015
10612 Brower Joshua Using Sysmon to Enrich Security Onion's Host-Level Capabilities GCFA Mar 27, 2015
33656 Johnson Josh Finding Evil in the Whitelist GSEC Mar 24, 2015
36190 Jeng Allen Minimizing Damage From J.P. Morgan's Data Breach GSEC Mar 17, 2015
6883 Pubal Jason Web Application Firewalls GCIA Mar 16, 2015
635 Belangia David Data Breach Preparation GLEG Mar 16, 2015
7338 Douglas Mick Powercat GPEN Mar 04, 2015
20328 Mourad Hassan Sleeping Your Way out of the Sandbox GSEC Mar 04, 2015
54 Hartman Kenneth What Every Tech Startup Should Know About Security, Privacy, and Compliance GCCC Feb 25, 2015
6768 Risto Jonathan Exercise - not just for your body anymore GSLC Feb 20, 2015
8591 Khalil George Open Source IDS High Performance Shootout GCIA Feb 17, 2015
1296 Cardinal Steven Monitoring Baselines with Nagios GSNA Feb 12, 2015
9027 Shanks Wylie Enhancing Intrusion Analysis through Data Visualization GCIA Feb 12, 2015
36189 Sass Jeff The Role of Static Analysis in Heartbleed GSEC Feb 12, 2015
9290 Mashburn David NetFlow Collection and Analysis Using NFCAPD, Python, and Splunk GCIA Feb 10, 2015
8038 Ashley Daryl An Analysis of Gameover Zeus Network Traffic GCIA Feb 09, 2015
350 Imbert Courtney Using the PMBoK Framework on Small Business IT Projects GCPM Feb 09, 2015
17828 Young Jason The Integration of Information Security to FDA and GAMP 5 Validation Processes GCIH Feb 05, 2015
23577 D'Herdt Jan Detecting Crypto Currency Mining in Corporate Environments GCIH Feb 04, 2015
6613 Catanoi Maxim Penetration Testing: Alternative to Password Cracking GPEN Feb 02, 2015
8570 Filkins Barbara A Plan for How to Get There and What to Do When You Arrive: Practical Advice on Establishing a Security Information Management Program within Healthcare GSLC Jan 26, 2015
95 Hayden Ernie An Abbreviated History of Automation & Industrial Controls System and Cybersecurity GICSP Jan 26, 2015