A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Information Overload, Future Shock, IBM & The Nature of Modern Crime Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

Information Overload, Future Shock, IBM & The Nature of Modern Crime
Derbycon 2012

What do all of the terms in the title have in common? Come to my talk and hear about how management practices of the past have come to represent the very nature of modern crime and fraud. Techniques designed in the 60's are now being used to power conglomerates, the GDP of small nations and that guy that stole your credit card number from vulnerabletosqli.com. Once we get our heads wrapped around how crime actually works and why it is so effective, maybe we can apply some of that knowledge to solving the problem in the future, before they publish the 7 Habits of Highly Effective Data Thieves into paperback. Take aways from this talk include knowledge of the cellular structure of criminal activity, interrelations between cells, some ideas on mapping the crime stream and how all of this applies to your day job (hint awareness and upper management’s view of the threat…).

Brent Huston

I am a 20+ year infosec veteran with a history of breaking things, making things and teaching things. I also do a lot of things that start with the letter s. Beyond that, I am the Security Evangelist of MicroSolved, Inc. in Columbus, Ohio. I spend a great deal of time researching threats, making fake things, playing with honeypots and teaching clients what NOT to do. My talks are generally interactive, open to suggestion and often contain a shot of island rum for humor.
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast