Discover essential strategies for managing an inherited security department in this 46-minute conference talk. Learn about open-source intelligence tools like ReconNG, The Harvester, and Odin. Explore best practices for securing your network, including disabling SSL, implementing centralized login, and removing unnecessary software. Gain insights into incident response, purple teaming, and application whitelisting. Understand the importance of compliance, VLANs, budgeting, and user education. Acquire valuable knowledge on vulnerability scanning and other critical aspects of cybersecurity management to effectively lead your newly inherited security team.
So You've Inherited a Security Department - Now What