Insider Threat Management – Detect and Respond to Data Exfiltration

As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration

Insider Threat Management – Detect and Respond to Data Exfiltration

As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they ac… Continue reading Insider Threat Management – Detect and Respond to Data Exfiltration

BSides Columbus 2019, Isaiah Sarju’s ‘How Online Dating Made Me Better At Threat Modeling’

Videography Credit: Irongeek (Adrian Crenshaw, et. al). Please visit Irongeek for additional videographer credits and important information. Enjoy!
Permalink
The post BSides Columbus 2019, Isaiah Sarju’s ‘How Online Dating Made Me Better At… Continue reading BSides Columbus 2019, Isaiah Sarju’s ‘How Online Dating Made Me Better At Threat Modeling’