Items Tagged with "Information Security"
November 29, 2012 Added by:Tripwire Inc
Liars and Outliers is such a departure from his usual technical subject matter, that I was concerned that Mr. Schneier may have overreached. It’s not every day that a security guru talks about theories of coercion and explains how society establishes and maintains trust – that’s about society, not components...
November 12, 2012 Added by:Joel Harding
Now that IO has a new definition, there is no longer a clear cut way to divide up the parts. My friend and mentor, Dr. Dan Kuehl, invented a model I like to use, called the Three C model. ‘What we do’ can be divided into Connectivity, Content and Cognitive...
November 06, 2012 Added by:Larry Karisny
Cyber Security Expert Joe Weiss has spearheaded the ICS Cyber Security Conference for 12 years and when he calls in the troops, the best come to serve. Last month’s conference held at Old Dominion University's Virginia Modeling Analysis and Simulation Center -- VMASC in Suffolk, Va. -- was no different...
October 28, 2012 Added by:Rafal Los
When Microsoft converged their kernel and made a single version of Windows most people were relieved, especially Microsoft developers and security types. It was now going to be easier to maintain the code base - but was that the right call? I think the jury may still be out...
October 23, 2012 Added by:Infosec Island Admin
"Our team is extremely pleased with the high caliber, diversity and expertise of the confirmed speakers we have secured for this event. Having such a dynamic lineup of highly respected industry professionals to share their knowledge and inspire those seeking employment..."
October 18, 2012 Added by:Rafal Los
The audience matters when you're collecting data and trying to make sense of it. In fact, the audience matters so much that sometimes you can't even 'refine' your way from one tier to another without going out and collecting a whole new set of data..
October 17, 2012 Added by:Brent Huston
Wireshark – Sharking the wires is one of my favorite things to do. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need...
October 09, 2012 Added by:Tripwire Inc
In the corporate world, we talk a lot about corporate goals & objectives. In the US Government, you hear a lot about “The Mission,” which is the unifying goal that ties an agency (or multiple agencies) together in a shared sense of purpose. I’m a big believer in connecting our actions as information security professionals to The Mission...
October 02, 2012 Added by:Philip Polstra
As always happens in a multi-track con, I was unable to attend every talk, so don't take offense if you spoke and your talk isn't listed here. I received many good reports from my students who attended different talks. None of my students complained about any bad talks...
October 01, 2012 Added by:Tripwire Inc
As security is becoming more important in the overall risk posture of organizations, boards are becoming more interested hearing directly from security executives which requires a different level of communication that CISO/CSOs may not be used to presenting...
September 30, 2012 Added by:Rafal Los
Sticking to the basics wouldn't be such a bad thing in Security... if we had a clue on how to do the basics right. I know plenty of people who pentest all day every day and they'll be the first to tell you how easy it is to break in because defenses are so weak, if they exist at all...
September 30, 2012 Added by:Fergal Glynn
From giant industry events, analyst events, regional events, hacker cons, to any kind of gathering you can think of including conferences on boats, trains, and buses. At any given time, you can find a security conference happening. What is it about the industry that loves an event?
September 27, 2012 Added by:Wendy Nather
A disturbing trend in security conferences is meta-talks that have nothing to do with pwning stuff. Burnout, sexism, career advice, economics, recruiting, food, exercise and other presentations on what's wrong with the security industry, are replacing actual knowledge transfer...
September 24, 2012 Added by:Tripwire Inc
Security people tend to be engineering oriented and suffer in the communication department. There’s an implied link that security might get broader adoption if security communication had more resonance with non-security people. Enter the popular use of the metaphor as meme...
September 23, 2012 Added by:Ben Rothke
With the release of Hacking Exposed 7: Network Security Secrets & Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic. The book includes the essentials of hacking...
September 22, 2012 Added by:Brent Huston
Emphasize that there are security measures that are effective in zero day situations. These include such controls as anomaly based detection mechanisms, system user security training, and incident response programs. If you can detect these attacks early and respond to them correctly...