Chris Hodson (@chrishinfosec) 's Twitter Profile
Chris Hodson

@chrishinfosec

Chief Security Officer | Investor and Board Advisor | Author: Cyber Risk Management | For technology musings, fitness and web3: @stods21 (verified)

ID: 3132646057

linkhttps://medium.com/@chrishinfosec calendar_today02-04-2015 18:21:59

23 Tweet

3,3K Followers

886 Following

Panther (@runpanther) 's Twitter Profile Photo

Contentful CISO, Chris Hodson, shares why security organizations should start macro with analysis of business processes. “Start with business processes, look at the applications that support it, look at the infrastructure that supports it, then look at the data flows.”

Francesco Cipollone🔥Appsec and ☁️ Cloudsec 🐒 (@franksec42) 's Twitter Profile Photo

SLA: What are the right Security SLA for the vulnerabilities? Some Example of SLA (taken from palantir approach) and escalation Severity Level 1 – risk level critical – Response time: 1 hour – Resolution time: 4 hours – Escalation: CIO/CISO/ Board

SLA:
What are the right Security SLA for the vulnerabilities?
Some Example of SLA (taken from palantir approach) and escalation

Severity Level 1 – risk level critical
– Response time: 1 hour
– Resolution time: 4 hours
– Escalation: CIO/CISO/ Board