A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Grim Trigger - Jeff “ghostnomad” Kirsch Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Grim Trigger - Jeff “ghostnomad” Kirsch
Derbycon 2013

Description: “There is almost nothing more frightening than a audit. Someone is going to look at what you do, how you do it, and why you do it and tell you if you are doing it “”right”" or “”wrong”". Not only will the audit potentially find areas of improvement, it is going to take your time away from getting the everyday work done. When all is said and done you may have a list of things the auditors want you to “”fix”" and you may not know what is really required of you. More importantly, you may not know when to say No. In this talk we will walk through different types of audits and pull back the curtain on what auditors say and do. With a little more confidence in how the process works, we will then discuss what audit findings actually mean and the auditors’ expectations of you after the audit. Finally, with your confidence building, we will explore how you can tell your auditors No without activating the Grim Trigger, making future audits more bearable.”

Bio: After 14 years as an auditor, I “saw the light” and 2 years ago switched to the field of information security. Being a father of four young children helps me keep things simple, while being married to a School Neuropsychologist helps me understand the way people think and learn. Mixing that all together, I am able to bring a different perspective by associating real life events to the challenges in information security. I also enjoy simplifying the complexities of Technology through the simplicity of Haiku.

Back to Derbycon 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast