Главная
Study mode:
on
1
Intro
2
Secondary Responsibility Syndrome
3
Travel Guide
4
Small Business Enterprise
5
Legacy Perimeters
6
Risk is Real
7
Zombies
8
Developers
9
Blacklisting
10
Evil People
11
Lost Something
12
Whats Next
13
How to Sell
14
Risk Assessment
15
Blueprint
16
Security Controls
17
Passwords
18
Solo
19
Core Information
20
Technical Controls
21
Datacentric
22
Security Risk
23
Security Awareness
Description:
Explore a comprehensive approach to information security for organizations without dedicated InfoSec staff in this 24-minute conference talk from BSidesLV 2014. Learn about secondary responsibility syndrome, risk assessment for small businesses, legacy perimeter challenges, and effective security controls. Discover strategies for implementing technical controls, managing security risks, and fostering security awareness. Gain insights on how to sell security initiatives, create a blueprint for security measures, and address core information protection. Understand the importance of datacentric security and how to navigate common challenges such as password management and dealing with potential threats.

No InfoSec Staff? No Problem

BSidesLV
Add to list