Stuck in Traffic – WannaCry Ransomware Attacks

Archive for May, 2017

Tarnished Silver Bullets

Posted by

Converge Detroit 2017. They make it sound easy. Identify data assets. Assess threats. Protect it. Encrypt it. In theory, sure. In practice, not so much. Besides, what does a real attack look like? Encryption, as with any security tactic, quickly becomes complex and diffuse without a unifying strategy. The question of how it protects the organization’s mission must be answered. And what about threats and criminal activities? This session details how to identify and document the business processes, convert threat intelligence into actionable threat models, and strategically deploy encryption.

Watch more videos on my YouTube channel.