Overview
Syllabus
Introduction
Breaking conventions
You might feel uncomfortable
What are we discussing
I like people
Weve conquered it
Theyre relatively lazy
Technology
Vulnerability
Defense
Compliance
Shame victims
We are connected species
We do bits and pieces
We dont test
Why we dont test
Border devices arent enough
What is AVA
What does AVA mean
Phases
Principle of Least Privilege
Pulling Information
Phishing Attacks
Honeypot SMS
Powerplay
Call to Action
Giving the option of succeeding
Behavior over time
Training is big business
Graphs
Predictive Behavior Analysis
Boring Technologies
Demo
Case Study
Public Interest Security Tool
Threat Intelligence Application Security
Spam
Privacy
Complexity
Scale of Data
Why Compromise
Why We Need Unicorns
Nest
Google
Learn more
Questions
Taught by
Black Hat