Главная
Study mode:
on
1
Intro
2
Nightclub
3
What it is like to be in the middle
4
Joeys background
5
Joeys wife Ashley
6
Audrey
7
Logan
8
Attack Surface
9
Growing Attack Service
10
Business Alignment
11
Compliance
12
Compliance Model
13
Compliance doesnt cut it
14
Joeys approach
15
Maturity
16
Timeline
17
Social Engineering
18
Access Control Identity Management
19
What do I do in Year 3
20
Policy enforcement in people
21
Onnet vs Offnet
22
Information Security Operations Center
23
Security Awareness
24
Catch of the Quarter
Description:
Explore a comprehensive conference talk on maturing information security beyond compliance standards. Delve into Joey Smith's personal experiences and professional insights as he discusses the evolving attack surface, business alignment challenges, and the limitations of traditional compliance models. Learn about a strategic approach to security maturity, including timelines, social engineering tactics, access control, and identity management. Discover practical strategies for policy enforcement, on-net vs. off-net security considerations, and the implementation of an Information Security Operations Center. Gain valuable knowledge on enhancing security awareness and the importance of recognizing and rewarding security-conscious behavior within organizations.

Maturing Information Security When Compliance Doesn't Cut It

Add to list