A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Are you a Beefeater - focused on protecting your crown jewels? - Jack Nichelson Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Are you a Beefeater , focused on protecting your crown jewels?
Jack Nichelson
Derbycon 2014

Want to become a BeefEater, show up to this presentation and walk away with another weapon in your arsenal to identify and protect your Crown Jewels. Once you have your boards protected, you are ready to create an elite grade to defend your most valuable objects even from trusted insiders. How to build stakeholder alignment and put data classification into action in your organization and achieve real value by the business being part of the process. Data identification, classification, and inventory are the building block of protecting data. You can’t protect the crown jewels if you don’t know where they are located. This case study will detail the efforts currently underway in my company to create consensus and engage multiple business units in identifying & defending our crown jewels. Small steps are better than no steps, and by the end of this presentation, you will have a start to building your own counterintelligence program.

Back to Derbycon 2014 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast