Existing defence measures do not match attacker tactics
6
Nakatomi space
7
Who owns cybersecurity
8
Four pillars of cybersecurity
9
Most ignored component
10
Bank statements
11
App activity statement
12
Two harmonious mindsets
13
Transparency
14
Maturity
15
Users
16
Zero Days
17
Dancing Pigs
18
Stupid People
19
User Behaviour
20
User Maturity
21
User Maturity Curve
22
Uninformed Users
23
Reward Users
24
Password Composition Guidelines
25
How many of you use WhatsApp
26
How do you log into WhatsApp
27
The big message
28
Banking customer suggestion
29
Telegram
30
Gmail
31
Take ownership of cybersecurity
32
Change the mindset
33
Questions
34
Political problem
35
Change the thought process
36
Look for simple things
Description:
Explore the challenges faced by modern CISOs and learn effective strategies for building defendable systems in this insightful conference talk from the Hack In The Box Security Conference. Delve into the complexities of enterprise defense, including the evolving threat landscape, shortage of infosec expertise, short lifespan of security products, and increasing compliance requirements. Gain valuable insights from 18 years of experience working with global organizations as an offensive testing vendor. Discover the four pillars of cybersecurity and understand the importance of user maturity in creating a robust security posture. Examine the concept of "Nakatomi space" and learn how to balance technical solutions with user behavior. Uncover the benefits of transparency, maturity, and changing mindsets in cybersecurity management. Analyze real-world examples from banking, messaging apps, and email services to understand practical applications of security principles. Leave with a fresh perspective on taking ownership of cybersecurity and implementing simple yet effective measures to enhance your organization's defense capabilities.
Read more