Главная
Study mode:
on
1
Intro
2
The Thought Process
3
The Attacks Evolve
4
Targets Have Shifted
5
Motivation
6
DDOS
7
Breaches
8
Perimeter
9
Hacks Happen
10
Browser Exploit
11
Nakatomi Space
12
Black Hat 2003
13
Exploits
14
Bug bounties
15
The problem with bug bounties
16
Dont play this game
17
How users behave
18
Advanced technology
19
User safety
20
User choice
21
Reactive approach
22
Compliance
23
The Golden Truth
24
Infosec Defense
25
Machine Learning
26
Stop 99 of malware
27
One percent of malware
28
We have to change
29
Intelligence
30
Proactive Security Testing
31
Collect everything
32
Our customers
33
Historical data
34
Moores law
35
The value of historical data
36
Battle of Two Narratives
37
Red Team
38
Who are you scared of
39
User ratings
40
User hardening efforts
41
Metrics
42
Shift the curve
43
Booby traps
44
Analysis decides actions
45
Block diagrams
46
Tracking
47
Blueprint
48
Buying from the top
49
Compliance and audits
50
Creativity
51
Business Value
Description:
Explore a thought-provoking conference talk that challenges the reactive nature of information security defenses. Delve into the evolution of attacks and offensive techniques over the past 16 years, from One-Way Web Hacking in 2001 to Stegosploit in 2016. Examine how defense strategies have consistently lagged behind emerging threats, and discover why it's time for a paradigm shift in security architecture. Learn about the basics of a proactive defense approach that could revolutionize the field. Gain insights from Saumil Shah, an internationally recognized security expert, as he shares his extensive experience and proposes innovative solutions to combat modern cyber threats. Understand the changing landscape of attack targets, motivations, and techniques, including DDOS, breaches, and browser exploits. Critically analyze current practices such as bug bounties and compliance measures, and explore the potential of advanced technologies like machine learning in cybersecurity. Discover the value of historical data, intelligence gathering, and proactive security testing in building a more robust defense strategy. Examine the concept of user hardening efforts and the importance of metrics in shifting the security curve. Gain a comprehensive understanding of the challenges facing the infosec industry and the potential pathways to a more secure digital future. Read more

The Infosec Crossroads

Cooper
Add to list