Yolanta Beres

Researcher
Cloud and Security Lab
Bristol

Biography

Yolanta is a researcher in the Systems Security Lab, focused on working to create a trustworthy information system environment in the face of challenges such as the growth of organized cybercrime and the rapid adoption of social networking tools and cloud-based services.

 

Research interests

  • Security analytics
  • Risk management
  • Economics of information security
  • Audit and compliance
  • Threat and attack environment

Publications

Y Beres, J Griffin, S Shiu, M Heitman, D Markle, P Ventura, "Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window This is a Non-HP site", Proc. of 2008 Annual Computer Security Applications Conference, December 2008.

A Baldwin, Y Beres, M Casassa Mont, J Griffin, S Shiu, "Identity Analytics: Using Modeling and Simulation to Improve Data Security Decision Making", HP Labs Tech Report, November 2008.

Y Beres, J Griffin, S Shiu, "Security Analytics Driving Better Metrics This is a Non-HP site", Metricon 3.0, July 2008.

A Baldwin, Y Beres, M Casassa Mont, S Shiu, "Assurance for Federated Identity Management", HP Labs Tech Report, March 2008.

A Baldwin, Y Beres, S Shiu, "Auditing in Shared Distributed Virtualized Environments", HP Labs Tech Report, January 2008.

A Baldwin, Y Beres, S Shiu, "Model-based Assurance of Security Controls", HP Labs Tech Report, January 2008.

A Baldwin, Y Beres, M Casassa Mont, S Shiu,"On Identity Assurance in the Presence of Federated Identity Management Systems", Proc. of Digital Identity Management (DIM) Workshop, December 2007.

A Baldwin, Y Beres, S Shiu, "Using Assurance Model to Aid Risk and Governance Lifecycle", BT Technology Journal, vol. 25 no.1, January 2007.

A Baldwin, Y Beres, S Shiu, "Using Assurance Models in IT Audit Engagements", HP Labs Tech Report, January 2007.

Professional activities

Member of the ISACA This is a Non-HP site community:

  • Presented at ISACA European Computer Audit, Control and Security (CACS) Conference, 2008.
  • Presented at ISACA IT Governance, Risk and Compliance Conference, 2007.