A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hackers, Attack Anatomy and Security Trends — Ted Harrington (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)

Hackers, Attack Anatomy and Security Trends — Ted Harrington
Circle City Con 2014
http://circlecitycon.com

Abstract: Studies1 show that as many as 89% of CIOs express confidence in the effectiveness of their security practices, yet those practices often fail to account for evolved, modern adversaries. Malicious hackers advance their techniques at a staggering pace, often rendering current defense tactics obsolete. Presented by the elite organization of white hat hackers most widely known for being first to break the iPhone, Android and Ford Motors Immobilizer Keys, this session will analyze the anatomies of real world attacks, ranging from the well known Target breach to lesser known but equally devastating compromises. It will provide a framework of paradigm shifts to account for these modern attackers, articulate industry context, and supply attendees with key takeaways, including immediately actionable guidance.

Back to Circle City Con 2014 Videos list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast