Involuntary Case Studies In Data Security presented at SecTor 2010

by Mike Rothman,

Tags: Security

Summary : It is absolutely backwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. In this session, Mike Rothman will name names as he builds in-depth case studies based on publicly available information, some of which isn't overly public. He will combine these with the latest information from breach reports and other statistical sources to build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time.