Information Security Latest Trends Convergence onto Security Platforms: Endpoint, Email security gateway, Web security gateway, and Next-generation firewall Virtualization: Virtualization of security controls will alter the information security landscape. Cloudification: How to enforce an enterprise security policy in the cloud age? Externalization: How to be open, social and encourage secure collaboration with external entities? Consumerization: Increasingly, employees want to use their consumer technology (systems and software) for business use. Operationalization: Need a strategy / R&D and an operational component to security. The strategy / R&D team needs to have time and resources to tackle the new and emerging threats. Application Security Methodology Threats, Attacks, Vulnerabilities, and Countermeasures Application Threats / Attacks Mobile Application Security Security testing for applications Security standards and regulations Information Risk Management Understanding your risk Measuring and quantifying your risk Managing your risk Optimizing expenses Presented by: Security Art Security Art is an information security and risk management consulting and advisory boutique. They use a multi-disciplinary approach with years of hands-on experience giving businesses the strategic path to address all their information security and risk management needs.