Главная
Study mode:
on
1
Intro
2
I PWN thee
3
Industry Attack
4
Whats on the Left
5
Employee Empowerment
6
Employee Power
7
CIA Headquarters
8
Security Conference
9
Firewall Rules
10
Dual Factor
11
Not Following Established Procedures
12
Serious Questions
13
Insider Threats
14
Contractor Data Breach
15
Gamification
16
Social Media
17
Emails
18
Security
19
Metrics
20
Confession
Description:
Explore a thought-provoking conference talk on cybersecurity and social engineering delivered at GrrCON 2019. Delve into topics such as industry attacks, employee empowerment, insider threats, and the importance of following established security procedures. Gain insights on dual-factor authentication, firewall rules, and the potential risks associated with contractor data breaches. Learn about the role of gamification, social media, and emails in cybersecurity, and understand the significance of security metrics. Discover real-world examples and confessions that highlight the critical nature of information security in various settings, including government agencies and corporate environments.

I PWN Thee, I PWN Thee Not

Add to list
0:00 / 0:00