| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
What do all of the terms in the title have in common? Come to my talk and
hear about how management practices of the past have come to represent the very
nature of modern crime and fraud. Techniques designed in the 60's are now being
used to power conglomerates, the GDP of small nations and that guy that stole
your credit card number from vulnerabletosqli.com. Once we get our heads wrapped
around how crime actually works and why it is so effective, maybe we can apply
some of that knowledge to solving the problem in the future, before they publish
the 7 Habits of Highly Effective Data Thieves into paperback. Take aways from
this talk include knowledge of the cellular structure of criminal activity,
interrelations between cells, some ideas on mapping the crime stream and how all
of this applies to your day job (hint awareness and upper management’s view of
the threat…). Brent Huston
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast