Defending an enterprise on a low budget (Claus Cramon Houmann)
| February 15th, 2016/ \ _ ) (( )) ( (@) /|\ ))_(( /|\ |-| / | \ (/\|/\) / | \ (@) | |------------------/--|-voV---\`|'/--Vov-|--\-------------------|-| |-| '^` (o o) '^` | | | | `\Y/' |-| |-| | | | | Sorry, but this presentation is being |-| |-| ____ _ _ | | | | / ___|__ _ _ __ ___ ___| | ___ __| | |-| |-| | | / _` | '_ \ / __/ _ \ |/ _ \/ _` | | | | | | |__| (_| | | | | (_| __/ | __/ (_| | |-| |-| \____\__,_|_| |_|\___\___|_|\___|\__,_| | | | | |-| |-| | | | | |-| |_|_______________________________________________________________| | (@) l /\ / \\ \ /\ l `\|-| l / V )) V \ l (@) l/ // \I V
Abstract:
I’d like to talk about defense that works. Basics that work. Techniques that give you a chance. Tools/appliances/software that actually work and aren’t lemons. Very little technical in this talk. It’s about going beyond compliance into actually building in security/defensibility without going bankrupt or buying shelfware/blinking boxes. I will recommend some actual vendors and solutions that from a CISO POV are better than others + more value for money.
Bio:
Former CISO of a small bank, now Infosec blogger and works also as community manager at Peerlyst