A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Understanding Why Breaches Occur - John Survant & Don Wolfe Louisville InfoSec 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

Understanding Why Breaches Occur
John Survant & Don Wolfe
@jsurvant, @DonWolfeSF
Louisville InfoSec 2019

Most large companies have some sort of vulnerability management program in effect. Current practice is to perform penetration tests once or twice a year and perform vulnerability scans on a monthly basis. The more advanced companies are adding Web Application Firewalls and are performing scans on new software as it is developed. Yet with all these security activities breaches continue to occur. Activity does not always translate into results. In fact, performing the same activities over and over and expecting different results is the definition of insanity. This discussion is intended to hit on the main problem areas which contribute to security breaches and will also encourage contribution from the audience who attend.

Back to Louisville InfoSec 2019 video list

Printable version of this article

15 most recent posts on Irongeek.com:


    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2019, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast