Page 3 - CSA Cybersecurity Brochure Aug12_2019
P. 3

CUSTOM TRAINING PROGRAMS
                                                                Gain practical solutions for introducing or
                                                                expanding security assurance know-how with
                                                                our customizable interactive training workshops.
                                                                We cover a variety of comprehensive topics, from
                                                                introductory overviews to specific implementation
                                                                considerations. Workshop topics include:
                                                                •  Introduction to Cybersecurity: Suitable for all
        BENCH TESTING                                             audiences, this workshop provides details to
        Bench testing is independent product testing              baseline the environment and needs of your
        conducted in our cybersecurity laboratory. It can         specific industry’s cybersecurity requirements.
        help you identify how robust and resilient your         •  Security Risk Analysis (Threat Modeling):
        connected product or software is and will help            Provides examples of threat modeling
        you uncover mechanical or design flaws that could         practices with sufficient detail for adoption
        have safety and security implications. Our bench          by your organization.
        testing services include a variety of valuable          •  Quality Management & Supply Chain
        evaluation techniques, such as:                           Considerations: Presents an overview of QMS
        •  Black box / White box penetration testing              and supply chain practices needed to support
        •  Static source code analysis using the software         security across the entire product lifecycle.
          weakness enumeration (CWE) database                   •  Security Assurance: Explains specific activities
        •  Binary code analysis using the CWE database            and deliverables that will support your
        •  Vulnerability identification using the common          organization’s need to demonstrate
          vulnerability enumeration (CVE) database                product security capabilities and security
        •  Identification of known malware                        testing methods.
        •  Structured penetration testing                       •  Applicable Standards, Frameworks, and
        •  Communication robustness testing and fuzz testing      Regulations: Trains your organization on specific
        •  Security controls evaluation
                                                                  cybersecurity standards and other requirements,
                                                                  which help you meet regulatory requirements for
                                                                  cybersecurity assurance in your industry.
   1   2   3   4   5   6