/   \       
 _                      )      ((   ))     (
(@)                    /|\      ))_((     /|\
|-|                   / | \    (/\|/\)   / | \                    (@)
| |------------------/--|-voV---\`|'/--Vov-|--\-------------------|-|
|-|                       '^`   (o o)  '^`                        | |
| |                             `\Y/'                             |-|
|-|                                                               | |
| |                 Sorry, but this presentation is being         |-|
|-|       ____                     _          _                   | |
| |      / ___|__ _ _ __   ___ ___| | ___  __| |                  |-|
|-|     | |   / _` | '_ \ / __/ _ \ |/ _ \/ _` |                  | |
| |     | |__| (_| | | | | (_|  __/ |  __/ (_| |                  |-|
|-|      \____\__,_|_| |_|\___\___|_|\___|\__,_|                  | |
| |                                                               |-|
|-|                                                               | |
| |                                                               |-|
|_|_______________________________________________________________| |
(@)            l   /\ /          \\       \ /\   l              `\|-|
               l /   V            ))       V   \ l                (@)
               l/                //             \I
                                 V

Abstract:
I’d like to talk about defense that works. Basics that work. Techniques that give you a chance. Tools/appliances/software that actually work and aren’t lemons. Very little technical in this talk. It’s about going beyond compliance into actually building in security/defensibility without going bankrupt or buying shelfware/blinking boxes. I will recommend some actual vendors and solutions that from a CISO POV are better than others + more value for money.

Bio:
Former CISO of a small bank, now Infosec blogger and works also as community manager at Peerlyst

Comments are closed.