| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Businesses today face challenges of many types: technical, strategic, interpersonal, the list could go on addressing these challenges requires sharp doers and effective leaders, and above all a solid approach. Together we will explore some of the problems, and solutions, influencing the key programs which dictate the overall posture and maturity of an information security program. After establishing a common context, we will look at the beginnings and solid early steps, as well as long term objectives that will mature and polish each program - and of course: lulz and hardcore gaming references aplenty!
Steven is a former IT Director and entrepreneur turned Senior Security and Network Communications specialist in the financial industry. With more than 15 years of experience with everything from tinkering in small business environments to designing nationwide media distribution networks, Steven now spends his time SIEMing, VMing, and testing controls. Steven is also a developer for the PoshSec project, CTF enthusiast, father to an awesome 1 year old daughter, and lover of difficult/roguelike games (moar permadeath, MOAR!).
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast