| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Abstract: In the wake of several major commercial breaches “DEFENDING†is the new hot topic. The industry had always favored attack and penetration and many people need to understand how to defend and respond to active attacks.
With the changing trends in Information Security, Incident Response is something that everyone talks about, but nobody really has a good grasp on how to do. Take your Incident Response up a notch - stop just mopping up the mess and really start cleaning.
Author Bio: “John Stauffacher (@g33kspeed) is a Principal Consultant with the Accuvant Labs Technology Services team where he performs perimeter, network and application security defense projects for clients. As part of the Technology Services team, John’s core function is to provide expert level consultation to clients as well as deliver training and knowledge enrichment. John has held high level technical certifications with major security vendors and is considered an expert in the field of perimeter security. John has also been a lead contributor to open source security projects, as well as an active speaker at conferences and author of a number of titles on the topic of network and perimeter security. John has carried an active CISSP certification since 2004.
Author Bio: Matthew Hoy (@mattrix_) is a Principal Consultant with Accuvant Labs Technology Services team. Matthew has worked in the Information Security world for over 15 years in various Information Security roles from Security Analyst, Architect, Incident Response, Consultant and Management. Matt currently holds CISSP and SANS GCIH Certifications. Matt has recently presented at Seattle Toorcon, B-Sides Los Angeles, Toorcon San Diego
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast