Weaponizing Layer 8

Presented at TROOPERS18 (2018), March 14, 2018, 5 p.m. (Unknown duration)

Do you think users are the weakest link in the security chain? Here's some duct tape to change that and to raise the bar for social engineers and other attackers.

Over the last few decades, sysadmins and people working in IT have called users names and generally rolled their eyes at the antics of those oh-so-uneducated people. From PEBKAC to DAU we called them names and didn't want them on our networks. This way of destructive thinking needs an overhaul, and we are going to show some easy things how users can become the valuable asset in corporate security that indeed they should be.

Find out about some creative things companies have done to significantly raise their security, and how users can become a major asset of any security team.


Presenters:

  • Bryan K. Fite as Bryan K Fite
    A committed security practitioner and entrepreneur, Bryan is currently a global account CISO at BT. Having spent over 25 years in mission-critical environments, Bryan is uniquely qualified to advise organizations on what works and what doesn't. Bryan has worked with organizations in every major vertical throughout the world and has established himself as a trusted advisor. "The challenges facing organizations today require a business reasonable approach to managing risk, trust and limited resources while protecting what matters."
  • Stefan Hager
    Having started with computers and starting to be puzzled by reality in the 80s, Stefan started out as a programmer in the early 90s. Since 2000 he has been securing networks and computers for various enterprises in Germany and Scotland. His main focus nowadays is threat research, raising security awareness and discussing new ideas concerning threat mitigation. When not trying to do any of the stuff mentioned above, he is either travelling, fiddling around with hardware or trying to beat some hacking challenge. Stefan also writes blog posts (in English and German) on his site cyberstuff.org.

Links:

Similar Presentations: