Hackers, Attack Anatomy, and Security Trends
Conference Archive
mLearnCon 2015 - June 10, 2015

Geoff Gentry
Regional Director
Independent Security Evaluators
Attacks against enterprises and their technology vendors are facilitated by the current rapid adoption of embedded systems, cloud solutions, and web-based platforms. These attacks often undermine the very monetization, scalability, and user experience goals for which these systems were designed and deployed. As malicious hackers advance their techniques at a staggering pace, often rendering current defense tactics obsolete, so too must security practitioners obsess over deploying progressive techniques.
In this session participants will extract lessons from these attack anatomies to provide a framework to account for these modern attackers, articulate industry context, and form key takeaways, including immediately actionable guidance. You will explore case studies to highlight decision-points, such as the deployment of a third party technology, and analyze the advantages and disadvantages of various decisions on the impact of system security.
In this session, you will learn:
- About discipline division: security separated from functionality
- Why perspective matters: white box vs. black box
- About defense priorities: secure assets, not just perimeters
- About timing security: build it in, not bolt it on
- About procedural duration: security as an ongoing process.
Audience:
Intermediate managers.
Technology
discussed in this session:
Embedded systems, cloud solutions, and web-based platforms.
Handouts
You do not have access to these files. Please log in or join with a free membership to download these files.

Upcoming Events
Recent Job Postings
- Learning Designer
Hartford, CT (Nationwide) - E-Learning Developer - Contract, Remote
United States - eLearning Project Manager
Brooklyn, NY, USA - Sr. eLearning Specialist
Olympia, WA & Remote - Instructional Designer
Pittsburgh, PA, USA