Risk might just be the second most overused word in IT Security. Here’s how to plug it into our security programs.
Watch more videos on my YouTube channel.
Risk might just be the second most overused word in IT Security. Here’s how to plug it into our security programs.
Watch more videos on my YouTube channel.
Two ways to answer the auditors when our IT security controls just aren’t quite where we need them to be.
Watch more videos on my YouTube channel.
Co presented with Zachary Sarakun.
Cryptocurrency brings with it a slew of new security concerns: 51% attacks, forks, and encryption busting quantum computing. This talk will explore the latest while providing background information on Blockchain and the inherent security controls it brings. That said, any technology is only as secure as the implementation. Moreover, every new technology gets adapted on the street to fit old crimes. Stolen wallets. Pyramid schemes. Confidence tricks and more. We’ll compare and contrast the crimes that the news media hypes and the cons that criminals routinely run.
Watch more videos on my YouTube channel.
We turn to DevOps for speed. We turn to Cloud for flexibility. We adopt faster, leaner, more collaborative processes to drive change. And then? We turn to information security for protection. But can we secure the technology without slowing the pace? This session presents an entirely fictional development organization adopting DevOps. We will discuss which traditional software security processes work, and which ones fail entirely. Awareness training, muscle memory, culture shifts, all will be brought together. The presentation will conclude with take-aways for applying security to your DevOps team without slowing down.
Watch more videos on my YouTube channel.
How to use GDPR Subject Access Requests (SAR) to build the business case for purchasing an Indy race car. Or, at least, to drive spending on GDPR compliance without over investing.
Watch more videos on my YouTube channel.
The FBI sent out an urgent request to reboot home WiFi routers. Bonus points for updating firmware and changing passwords. But apparently, few actually did. So what does this say about security when something as simple as a reboot doesn’t get done?
Watch more videos on my YouTube channel.
Check your cyber security insurance with incident response tabletops. Otherwise? When the rock falls from the sky? You may find yourself without coverage.
Watch more videos on my YouTube channel.
TeenSafe security incident highlights the paradox of reducing risk with data monitoring, which increases risk of data spillage. Also, please? Check your S3 buckets.
Watch more videos on my YouTube channel.
A cautionary tale about testing only what we expect to pass.
Watch more videos on my YouTube channel.
A high school, a phishing email, and a USB sniffing dog. All reminds us to think outside the box when it comes to security controls.
Watch more videos on my YouTube channel.