Threats - Inside & Out

 

Education Level: Basic

2213 - Security Through Intel or ‘Learning from Other People’s Mistakes’

Wednesday, September 27
8:00 AM - 8:50 AM

With every breach or incident that occurs, a lesson can be learned by looking closely at the step-by-step process of how everything developed. From the phishing e-mail campaign opening up a single user account to an attacker, to leveraging a 3-year-old vulnerability or transmitting data externally through an unauthorized open port, the “crime” can be forensically examined and discussed to understand the “why” and the “how” so it doesn’t happen to your organization. By reviewing events from the security incidents that occurred, we can understand the good and the bad decisions that were made and how to adopt or avoid them.

This discussion will focus on the step-by-step breakdown of several incidents that occurred with information publicly provided.

Learning Objectives:

Mike D'Arezzo

Director of Security Services
SLAIT Consulting

Michael "Mike" D’Arezzo has enjoyed more than 17 years in information technology and security. Prior to joining SLAIT Consulting as its Director of Security Services, Mike performed a myriad of IT functions at MICROS Systems (now Oracle), AMF Bowling (now Bowlmor AMF) and the General Electric Company. He has extensive experience in building security programs, like asset management and software governance, and developing and preparing organizations for regulatory compliance (including FFIEC, HIPAA and PCI) and regional and global regulatory frameworks. Mike holds a bachelor’s degree in IT management, specializing in security and compliance, from the University of Richmond and has both CISSP and CISA certifications.

Presentation(s):

Send Email for Mike D'Arezzo


Assets

2213 - Security Through Intel or ‘Learning from Other People’s Mistakes’

MP3 Audio Slides Video

Attendees who have favorited this

Please enter your access key

The asset you are trying to access is locked. Please enter your access key to unlock.

Send Email for Security Through Intel or ‘Learning from Other People’s Mistakes’