Featuring 7 Papers as of May 11, 2015
Building a Vulnerability Management Program - A project management approach
by Wylie Shanks - May 11, 2015
This paper examines the critical role of project management in building a successful vulnerability management program.
Using the PMBoK Framework on Small Business IT Projects
by Courtney Imbert - February 9, 2015
Successfully managing information technology (IT) projects is a complex endeavor. Project management frameworks might seem overreaching or incompatible with some of the characteristics common to small organizations, like multi-function employees and smaller budgets.
Security Visibility in the Enterprise
by Jim Hendrick - September 19, 2014
A large (Fortune 100) company decided to improve its corporate "security visibility." Through this effort they intended to move from simply meeting regulatory and compliance requirements toward a more mature model capable of focusing on specific areas of risk.
A Project Management Approach to Writing a GIAC Gold Paper
by Sally Vandeven - September 15, 2014
The SANS reading room has published thousands of papers on a wide range of computer security related topics at http://www.sans.org/reading-room.
A guide to leading and motivating highly driven professionals
by George Khalil - June 6, 2014
A project is defined as "a temporary endeavor undertaken to create a unique product, service or result."
Using the Department of Defense Architecture Framework to Develop Security Requirements
by James E. A. Richards - February 10, 2014
Integrated architectures embody the discernable parts of a system and their relationships with each other in a single, normalized data repository.
Free and Open Source Project Management Tools
by Robert Comella - February 4, 2014
Project management has been around for millennia. In the book of Genesis, Noah is given the Ark project (Genesis 6:11-21, New International Version).
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.