A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Creating A Powerful User Defense Against Attackers Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

Creating A Powerful User Defense Against Attackers
Derbycon 2012

Does your security defense stop at the firewall, antivirus, logging, auditing, and the IDS? Regardless of the size or complexity of your perimeter security if your user clicks on a malicious link or opens an infected file it could still be Ďgame overí for your network. One of the strongest defenses is knowledge and empowerment. In this talk, I will show you how we were able to get our executives, IT team, and all of our users excited about security. I will show you examples of how we convinced everyone in our organization that they are a part of the security defense team. I will show you what worked and what didnít work when we implemented this in our organization. Iíll talk about how these techniques that I used in an organization of 70 employees can work at organizations of all sizes. I will give you practical tools to sell the idea to your boss, sell the idea to your IT team, and sell the idea to your users which will help you create a powerful user defense against attackers.

Benjamin Mauch (Ben0xA):

I am the Vice President of Information Systems and the Security Officer for a medical billing company in Illinois. I have 11 years of experience doing Application & Web Development; Security Implementation, Consulting, & Training (Blue Team); Federal Regulation and Compliance oversight in relation to Information Technology (HIPAA, HITECH, PCI); and managing a team of developers and IT professionals.

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast