Defending an enterprise on a low budget (Claus Cramon Houmann)
| February 15th, 2016
/ \
_ ) (( )) (
(@) /|\ ))_(( /|\
|-| / | \ (/\|/\) / | \ (@)
| |------------------/--|-voV---\`|'/--Vov-|--\-------------------|-|
|-| '^` (o o) '^` | |
| | `\Y/' |-|
|-| | |
| | Sorry, but this presentation is being |-|
|-| ____ _ _ | |
| | / ___|__ _ _ __ ___ ___| | ___ __| | |-|
|-| | | / _` | '_ \ / __/ _ \ |/ _ \/ _` | | |
| | | |__| (_| | | | | (_| __/ | __/ (_| | |-|
|-| \____\__,_|_| |_|\___\___|_|\___|\__,_| | |
| | |-|
|-| | |
| | |-|
|_|_______________________________________________________________| |
(@) l /\ / \\ \ /\ l `\|-|
l / V )) V \ l (@)
l/ // \I
V
Abstract:
I’d like to talk about defense that works. Basics that work. Techniques that give you a chance. Tools/appliances/software that actually work and aren’t lemons. Very little technical in this talk. It’s about going beyond compliance into actually building in security/defensibility without going bankrupt or buying shelfware/blinking boxes. I will recommend some actual vendors and solutions that from a CISO POV are better than others + more value for money.
Bio:
Former CISO of a small bank, now Infosec blogger and works also as community manager at Peerlyst