Overview
Syllabus
Introduction
History of Information Security
Reusable Passwords
Strong Authentication and Encryption
Board of Directors
What Works
The Bottom Line
RSA Security
Operationalizing Security Tools
Security is a Risk Decision
Security isnt an Island
tabletop exercises
Data is key
Encryption
Encrypting
Why Encryption is Bad
Threat Model
Hold Your Own Key
You Use Cloud
You Use Public Cloud
Control
Audience Question
First Place to Look
Risk Register Framework
Whats the best tool set
Thoughts on CMMC
Thoughts on GDPR
The maturity model
Jury is still out
Twofactor authentication encryption
Admin privileged
Closeout
Outro
Taught by
RSA Conference