A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Evolutionary Security – Embracing Failure to Attain “Good Enough” - Josh More Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Evolutionary Security – Embracing Failure to Attain “Good Enough” - Josh More
Derbycon 2013

Description: “Security is splintering, Organizations splitting along complexity. Attackers are splitting into tiers focused on stealing money, clients and intellectual property. Successful defense requires understanding the shifting security ecosystem and the ability to rapidly reassess your position, the attacks coming at you and your options. To succeed, we must be willing to make decisions based on partial and often inaccurate data. We must find ways to make errors and adapt, so that evolutionary processes can improve our defenses the same way that they work for attackers. This talk explores a new way of thinking about the problems we face.”

Bio: Josh has over fifteen years of experience in IT and information security. Josh’s current role is as a security consultant, and he has previously filled roles as an application developer, system administrator and network engineer. He holds several security and technical certifications and has served in leadership positions on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssmartsecurity.com. Josh focuses on applying lessons from other disciplines to security practice. Josh More leads RJS Smart Security – a security consultancy focusing on smaller organizations looking to improve security without losing flexibility.

Back to Derbycon 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast