Presented at
DEF CON 20 (2012),
July 27, 2012, 3 p.m.
(50 minutes).
With an ever changing threat of nation states targeting the United States and its infrastructure and insiders stealing information for public release, we must continuously evaluate the procedural and technical controls we place on our national assets. This presentation goes into brief detail on how security controls are developed, reviewed, and enforced at a national level for protection of data classified up to Top Secret and some of the major flaws in the security approach to data privacy.
The purpose of this presentation is to raise awareness of substandard security practices within sensitive areas of the Federal Government and to influence change in how controls and practices are developed and maintained.
Presenters:
-
James Kirk
- Senior Security Consultant / Rapid7, Inc.
James Kirk is a Senior Security Consultant for Rapid7, Inc. who has over 11 years of experience in various information security disciplines. James, in his previous role, has served as a Special Agent for the Department of Defense (Defense Security Service) where he conducted numerous security audits of defense contractor facilities across the United States.
http://kirkjamesm.wordpress dot com
Links:
Similar Presentations: