security breach

security breach

ITCamp 2015 - Hacker’s Perspective - Think and Act Like Hackers to Protect Your Company’s Assets (Paula Januszkiewicz)

3d ago
SOURCE  

Description

Is there a weakness in your IT security system? Wouldn't it be better to find it before an untrusted source or hacker does? Even a small scale security breach could leave your business in poor condition. Every day, you can apply some basic behaviors to protect your company from attack. It is really surprising how often a hacker can use the same paths to enter your system! In the end, information security is not an IT department's problem, it is a business issue! Let’s put you into the hacker's role, and perform all the activities they would to better understand the threats. During this interactive session, you will be presented with the following: - The tasks performed by hackers, or penetration testers, in order to check for misconfigurations and vulnerabilities - New things that make it hard to expect what part of the operating systems will be hit - Ways to search for security-related updates and learn the newest threats to the infrastructure with mitigation methods - Facts around management, monitoring and hardening as the most important things right now to perform the right information protection - New technologies that are needed to keep up with the evolving insecure world - A tip sheet for implementing best practices Join Paula in the journey to the darker side of IT security, and use this knowledge for making good decisions related to your systems.