| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Throughout the history of information security people have asked a simple question; why do people do these things? Incidents ranging from unauthorized access to crafting of sophisticated malware are all the results of an array of motivations, and mindsets. This presentation will cover some of the top drivers for the "hacker" mentality and touch on the approaches they use that align to their end goals.
Mr. Brown has over 30 years experience in IT related fields including more than 20 years focused on information security. Working in a consulting and corporate capacity, Mr. Brown has a long history of solving the business and information security needs of a wide range of clients from Fortune 50 accounts to small businesses. Areas of expertise include security program design and review, incident management planning and response, including litigation hold (eDiscovery), policy and process development, vulnerability assessment, secure application development, security technology implementation and training and project management.
Recorded at BSides Philly 2017
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast