Blacklisting vendors to protect against shadow IT. Shout out to Adam Eickhoff for the idea.
Watch more videos on my YouTube channel.
Blacklisting vendors to protect against shadow IT. Shout out to Adam Eickhoff for the idea.
Watch more videos on my YouTube channel.
MySpace lost millions of photos and videos due to data corruption during a server migration. Upside, that probably includes those embarrassing photos from twelve years ago. Downside, data loss is data loss, and this reminds us of the importance of backing up our SaaS data.
Watch more videos on my YouTube channel.
One key takeaway from the 6th annual DevSecOps Community Survey conducted by Sonatype and others.
Watch more videos on my YouTube channel.
Presented at BSides SF 2019.
Muscle memory, incident responders will tell you, is crucial to acting quickly in a crisis. Cyber Threat Intelligence informs what we do, but practice ensures we do it well—executing effectively to eliminate the threat and protect the organization. This session provides an approach to developing security exercises and running practice drills. MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) forms the basis of this approach. We will cover the fundamentals of an exercise: selecting the story, identifying the tactics, threat modeling, table top discussions, adversarial emulation, and scoring. The session concludes with advice on creating an overall exercise program, focusing on repetition, momentum, and building muscle. Turn intelligence into practiced action with security game
Watch more videos on my YouTube channel.
How to create security and compliance problems: (1) Reduce the IT headcount; (2) Increase the workload with new projects. People have a finite capacity. Overrun the people and good things won’t be done and bad things will be overlooked.
Watch more videos on my YouTube channel.