Главная
Study mode:
on
1
Introduction
2
Purpose of the session
3
Note to the audience
4
What is a CSO
5
How can we help CSOs
6
RSA attack example
7
Anonymous and LulzSec
8
Real Fortune 50
9
Corporate Internet intranet
10
Master UNIX machines
11
Landman
12
Retrieve
13
FTP script
14
Outlook web access
15
Network Enumeration
16
Theory
17
ISO CSO
18
Im jealous
19
Im torn
20
Providing our worth
Description:
Explore a thought-provoking conference talk that challenges conventional wisdom about cybersecurity patching strategies. Delve into the complexities of protecting corporate networks, examining real-world examples including RSA attacks and the activities of hacker groups like Anonymous and LulzSec. Learn about the role of Chief Security Officers (CSOs) and how to support them effectively. Investigate various attack vectors such as corporate intranets, UNIX systems, and Outlook web access. Gain insights into network enumeration techniques and the theoretical aspects of information security. Reflect on the speaker's personal perspectives on the industry and discover strategies for demonstrating value in the cybersecurity field.

Tomorrow You Can Patch That 0day - But Your Users Will Still Get You P0wn3d

Add to list
0:00 / 0:00