-
David Lanter wrote a new post on the site Temple ISACA 6 years, 7 months ago
ITACS Webinar Series
Blockchain (cryptocurrency) is the technology that is most likely to cause the largest impact on the future of business. While the technology is complex, the idea is simple. At its core, […] -
David Lanter wrote a new post on the site Temple ISACA 6 years, 8 months ago
ITACS Webinar Series
Availability of visualization reporting tools has spawned incredible demand for new analyses: “Show us how results have changed over time,” business managers ask, “so we can answer the […] -
David Lanter wrote a new post on the site ITACS 5206 6 years, 11 months ago
-
David Lanter wrote a new post on the site Temple Univ. ISACA Student Group 7 years ago
I am Binju Gaire. I am a Master of Science graduate student in the IT Auditing and Cyber-Security (ITACS) Program and will complete my degree in August 2018.
Prior to joining the ITACS Program I worked as a […]
-
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 7 years ago
I am Binju Gaire. I am a Master of Science graduate student in the IT Auditing and Cyber-Security (ITACS) Program and will complete my degree in August 2018.
Prior to joining the ITACS Program I worked as a […]
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?
What are secure coding practice and what risks are they intended to […] -
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What are the common/shared risks and what are the different/unique risks faced by desktop applications versus web-based applications?
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What are secure coding practice and what risks are they intended to mitigate?
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
How would you determine if an applications development project team was using secure coding practices?
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
Quiz: Quiz
Quiz: Solutions
Presentation: Slides
Presentation: Video
-
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 7 years ago
Pervez Bamji
Vice President and General Auditor
Pitney Bowes, Inc. -
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 7 years ago
David Lingenfelter
Director of Information Security
Penn National Gaming and Hollywood Casinos -
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 7 years ago
Lisa Bonnell
Senior Vice President and General Auditor
Comcast Corporation
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What are the relative benefits and weaknesses of symmetric versus asymmetric encryption?
What roles do confusion and diffusion play in strong encryption? How are they achieved?
What are block and stream […] -
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What are the relative benefits and weaknesses of symmetric versus asymmetric encryption?
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What roles do confusion and diffusion play in strong encryption? How are they achieved?
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
What are block and stream ciphers, and where would you expect to find one versus the other (i.e. in what technologies) and why?
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years ago
Quiz: Quiz
Quiz: Solutions
Presentation: Slides
Presentation: Video
Book mentioned in lecture: Guide: Reporting on Controls at a Service Organization (SOC 2) (2014) American Institute of Certified […]
- Load More