๐Ÿ‘‰ ๐—ง๐—ฒ๐—น๐—ฒ๐˜€๐˜†๐˜€๐˜๐—ฒ๐—บ hashtag#HackersSuck ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฎ๐—ป๐—ฒ๐—น > ๐—ž๐—ฒ๐˜† ๐—ง๐—ฎ๐—ธ๐—ฒ๐—ฎ๐˜„๐—ฎ๐˜†๐˜€ ๐Ÿง

telesystems hackers suck

Recently I was invited to a Security Panel Discussion at The Star In Frisco, Texas for a Telesystem sponsored event, with notable keynote speaker ethical hacker ๐—•๐—ฟ๐˜†๐—ฎ๐—ป ๐—ฆ๐—ฒ๐—ฒ๐—น๐˜†.

This morning’s discussion included a collection of real world hacker exploits and techniques, careers advice for buddying InfoSec’ers, and even cyber insurance basics and requirements.

A few items from the day kept with me post event:

๐Ÿ˜Ž ๐—›๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜†: While hackers certainly have an advanced arsenal of methods for exploiting corporate environments, they more commonly leverage very simple techniques that essentially exploit human behavior, often bypassing security controls altogether.

It is very clear that if companies did only one thing to tighten their company security posture, it would be to ๐˜๐—ฟ๐—ฎ๐—ถ๐—ป ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ฒ๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฒ๐˜€ ๐—ผ๐—ป ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐˜„๐—ฎ๐—ฟ๐—ฒ๐—ป๐—ฒ๐˜€๐˜€.

Hearing ๐—•๐—ฟ๐˜†๐—ฎ๐—ป ๐—ฆ๐—ฒ๐—ฒ๐—น๐˜† talk about his white hacking past (I’d really characterize it as “grey hacking”) was as entertaining as is was interesting. He’s like a Kevin Mitnick but somehow without the jail-time.ย ย I also realized that I’m old, as when I was a “hacker” (kid stuff in the 1980s) Bryan ๐˜„๐—ฎ๐˜€๐—ป’๐˜ ๐—ฒ๐˜ƒ๐—ฒ๐—ป ๐—ฏ๐—ผ๐—ฟ๐—ป ๐˜†๐—ฒ๐˜… ๐Ÿ˜ณ๐Ÿ˜ณ๐Ÿ˜ณ — ๐˜ฃ๐˜ถ๐˜ต ๐˜ต๐˜ฉ๐˜ข๐˜ต’๐˜ด ๐˜ข๐˜ฏ๐˜ฐ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜ด๐˜ต๐˜ฐ๐˜ณ๐˜บ…

๐—ง๐—ฒ๐—น๐—ฒ๐˜€๐˜†๐˜€๐˜๐—ฒ๐—บ did a good job with this one. I know their roadshow is heading to a couple of cities in Ohio next; If you’re in the tour’s path, I highly recommend signing up: register for free here
https://lnkd.in/gAh68RXk

๐Ÿ˜‡ ๐—ง๐—ต๐—ฒ ๐—บ๐—ผ๐—ฟ๐—ฎ๐—น ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ ๐˜€๐˜๐—ผ๐—ฟ๐˜†: Make sure your organization maintains a persistent security awareness and governance plan. As the world marches more and more into digital dependency, and with new threat vectors opening up (e.g. clever use of AI), the risks are ๐™›๐™–๐™ง ๐™ฉ๐™ค๐™ค ๐™œ๐™ง๐™š๐™–๐™ฉ ๐™ฉ๐™ค ๐™œ๐™ค ๐™ฌ๐™ž๐™ฉ๐™๐™ค๐™ช๐™ฉ.



๐ŸŒŸ ๐˜‰๐˜ฐ๐˜ฏ๐˜ถ๐˜ด ๐˜ต๐˜ฐ ๐˜ฎ๐˜ฆ๐˜ฆ๐˜ต ๐˜ข๐˜ฏ๐˜ฅ ๐˜จ๐˜ณ๐˜ข๐˜ฃ ๐˜ข ๐˜ค๐˜ฐ๐˜ถ๐˜ฑ๐˜ญ๐˜ฆ ๐˜ฑ๐˜ช๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜‹๐˜ข๐˜ญ๐˜ญ๐˜ข๐˜ด ๐˜Š๐˜ฐ๐˜ธ๐˜ฃ๐˜ฐ๐˜บ’๐˜ด ๐˜๐˜ข๐˜ญ๐˜ญ ๐˜ฐ๐˜ง ๐˜๐˜ข๐˜ฎ๐˜ฆ๐˜ณ ๐˜›๐˜ฐ๐˜ฏ๐˜บ ๐˜‹๐˜ฐ๐˜ณ๐˜ด๐˜ฆ๐˜ต๐˜ต!

Related Posts