A Method to Secure(,) Good Results
by Noah Neukam
Most larger companies have an established process for building software, including their IT security and architecture. Such standardization is intended to create repeatable results, but are those results good? This presentation will use an exemplary process to show which methods are in use to protect IT applications and how methodology and processes influence the results. The goal is to get to know methodology in IT security and to raise awareness about its effects on “blind spots”.