Advertise here! > Contact Us
- presented by
- sponsored by
Most organizations introduce changes to their environment whether it be a new service provider performing a service, procuring new hardware/software in the IT/OT environment, lifting and shifting applications from on-premise to the cloud. Are we aware of the risks that may be introduced when a significant change occurs in our environment? Threat Risk assessments are important these days to capture any potential security gaps that may have been overlooked by the SDLC process. This presentation will review the best practices for a TRA process and touch on risk management.
Mike Han
Security Consultant, MH Consulting
Mike Han is a seasoned Cyber Security Professional with 15 years of experience in the Education, Healthcare, Utilities, and Oil and Gas energy sector. He has a wide breadth and depth of experiences in Cyber Security performing Threat Risk Assessments, Vulnerability Assessments, Penetration Testing, Security Architecture Planning and Design, Security Operations, Blue Team/Red Team, Security Investigations and Research, enhancing Cloud Security, and improvements on security controls in the OT environment. He strives to continuously learn more about new upcoming technologies such as the protection of Internet of Things, cloud automation, artificial intelligence and machine learning.
Advertise here! > Contact Us