Throughout the history of information security people have asked a simple question; why do people do these things? Incidents ranging from unauthorized access to crafting of sophisticated malware are all the results of an array of motivations, and mindsets. This presentation will cover some of the top drivers for the "hacker" mentality and touch on the approaches they use that align to their end goals.
Presentation outline:
Hackers then and now, how has the moniker changed over time
Threat ranges from the mundane to the advanced and persistent
Common traits among historical greats
An application of psychology to an incident investigation
The sources of all evil may not be what we think
The next generation of hackers and where they are headed
Mr. Brown has over 30 years experience in IT related fields including more than 20 years focused on information security. Working in a consulting and corporate capacity, Mr. Brown has a long history of solving the business and information security needs of a wide range of clients from Fortune 50 accounts to small businesses. Areas of expertise include security program design and review, incident management planning and response, including litigation hold (eDiscovery), policy and process development, vulnerability assessment, secure application development, security technology implementation and training and project management.
Recorded at BSides Philly 2017
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek