Hackers, Attack Anatomy, and Security Trends

Conference Archive

mLearnCon 2015 - June 10, 2015

Geoff Gentry

Regional Director
Independent Security Evaluators

Attacks against enterprises and their technology vendors are facilitated by the current rapid adoption of embedded systems, cloud solutions, and web-based platforms. These attacks often undermine the very monetization, scalability, and user experience goals for which these systems were designed and deployed. As malicious hackers advance their techniques at a staggering pace, often rendering current defense tactics obsolete, so too must security practitioners obsess over deploying progressive techniques.

In this session participants will extract lessons from these attack anatomies to provide a framework to account for these modern attackers, articulate industry context, and form key takeaways, including immediately actionable guidance. You will explore case studies to highlight decision-points, such as the deployment of a third party technology, and analyze the advantages and disadvantages of various decisions on the impact of system security.

In this session, you will learn:

  • About discipline division: security separated from functionality
  • Why perspective matters: white box vs. black box
  • About defense priorities: secure assets, not just perimeters
  • About timing security: build it in, not bolt it on
  • About procedural duration: security as an ongoing process.

Intermediate managers.

Technology discussed in this session:
Embedded systems, cloud solutions, and web-based platforms.


You do not have access to these files. Please log in or join with a free membership to download these files.


 Back to Library
Advertise Here
Advertise Here

Upcoming Events

Recent Job Postings