A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


So You've Inherited a Security Department, Now What… - Amanda Berlin Converge 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

So You've Inherited a Security Department, Now What…
Amanda Berlin
@infosystir

So many of us have been there. We've walked into an environment that has exploded with technology, but no talent to manage it, no leadership to distinguish FUD from real threats, and either zero infosec budget or so much they aren't sure what to do with it. If you are currently in this situation, you may not even know where to start. I'll go over great steps to start with that will have little impact on budget, but a large impact on moving forward for a more secure environment. Not everyone can afford or wants to hire a contractor to come in and fix everything for them and I want this to help play the part of the blue team contractor

My name is Amanda Berlin (@infosystir). I have spent over a decade in different sectors providing infrastructure support, triage, and design. I have been a part of organizations that were well thought out and designed, and others where each and every person is running around putting out technical fires and playing catchup each and every day. I have been on several levels of defense my entire career along with learning and practicing offense as well.

Bill is a detective in the Major Crimes Division, Organized Crime Section of the Los Angeles Police Department where he has worked for 16 years. He has worked patrol, gang enforcement and as a homicide detective in South Central Los Angeles for the majority of his career. Bill has been an active duty and reserve Army officer for nearly

So many of us have been there. We've walked into an environment that has exploded with technology, but no talent to manage it, no leadership to distinguish FUD from real threats, and either zero infosec budget or so much they aren't sure what to do with it. If you are currently in this situation, you may not even know where to start. I'll go over great steps to start with that will have little impact on budget, but a large impact on moving forward for a more secure environment. Not everyone can afford or wants to hire a contractor to come in and fix everything for them and I want this to help play the part of the blue team contractor

Back to Converge 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast