Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive breakdown of information security program rebuilding in this conference talk from Louisville InfoSec 2013. Delve into breach analysis, current hacking technologies, and next-generation security solutions. Examine the effectiveness of social engineering techniques and emotional triggers in cybersecurity. Learn how to change organizational culture, prioritize security measures, and implement effective monitoring and detection strategies. Gain insights on education, awareness, and the importance of making security a friendly presence within an organization. Discover the speaker's "1 year challenge" approach to focus on essential security practices and conduct penetration testing for a more robust information security program.
Syllabus
Intro
About the Speaker
Breach Breakdown
Breaches
Hacking Current Technologies
NextGen Firewalls
So we have behavioral analysis
Application Whitelisting
We have Anti-Virus
Technology
Introduction: Social-Engineering
Key Emotional Triggers
Why it's effective
Trolling Starbucks
Trolling (CONT)
Information Overload
The Choice
Burn it Down
Step 1 - Change the culture
Education and Awareness
Making Security a Friend
The 1 year challenge.
Focus on the basics
Prioritization
Monitoring and Detection
Penetration Testing
Step Away