{"id":3354,"date":"2022-07-25T22:21:00","date_gmt":"2022-07-25T20:21:00","guid":{"rendered":"https:\/\/webdev.atsec.us\/?p=3354"},"modified":"2024-07-24T22:24:24","modified_gmt":"2024-07-24T20:24:24","slug":"challenges-and-opportunities","status":"publish","type":"post","link":"https:\/\/webdev.atsec.us\/challenges-and-opportunities\/","title":{"rendered":"Challenges and Opportunities"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

Many of us who have been in the evaluation and certification (validation) business\u00a0 have seen the development, not only of security requirements and schemes, but also how the \u201csecurity echo system\u201d works. A few weeks ago, I was generously given the opportunity to share some ideas at the EU CSA conference in Brussels. Here is a short summary of the ideas behind that presentation.<\/p>\n\n\n\n

What makes a scheme successful?<\/strong>
No scheme will survive without a market demand. Just being technically brilliant and formally correct will not make it a successful scheme. We have seen quite a number of schemes being established and operated over the years. Quite often, the scheme developers are technicians with a focus on requirements and formalism, however a successful scheme needs:<\/p>\n\n\n\n