A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Pen Testing Security Vendors Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

Pen Testing Security Vendors
Derbycon 2012

Vendors are a necessary evil of the security industry. They make their money taking ours and, if we're lucky, they give us something useful in return. If we're unlucky, we wind up having to manage security incidents while simultaneously managing their broken technology. How can we tilt the odds in our favor? How can we identify which vendors are worth considering? We need detailed analytics. We need a way to independently compare vendors to one another using unambiguous metrics. This presentation compares vendors in many different categories and introduces a methodology for others to use. Ever had trouble making a decision about which vendor to pick when they all look very similar? This presentation will show you a way.

Josh More

Josh has over fifteen years of experience in IT and information security. Josh’s current role is as a security consultant, and he has previously filled roles as an application developer, system administrator and network engineer. He holds several security and technical certifications and has served in leadership positions on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssmartsecurity.com. Josh’s current initiatives are focused on applying lessons from other disciplines to security practice. Josh More leads RJS Smart Security – a security consultancy focusing on smaller organizations looking to improve security without losing flexibility.
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast