Many of the largest breaches begin with a traditional malware and phishing attack rather than using an arsenal of super-secret 0-days to gain initial entry to a network. This talk gives a walk through of how he has been analyzing and responding to such attacks using freely available tools and techniques and how this can be applied in your corporate or home environment.

Topic 2: Identity Assurance: Who is Really Logging into your System? Speaker: Les Thompson

Even outside the context of Federated Identity Management, corporate systems require varying degrees of assurance their users are who they claim to be - what we used to call Non-Repudiation. While authentication strength plays an important role, the user provisioning/administration procedures may be just as important. And what does identity assurance mean in the context of devices, applications and services?

Sign in to edit

Complete your event page

 
×
twitter
facebook
linkedin