This month we’ll discuss network set up and hardening prior to a penetration test. Also this session, we’ll conduct a wireless attack demo. Attendees are advised to leave their smart phones off or in the car unless they want their digital content exposed.
TechJunction addresses critical IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
In the current cyber security climate, there is a tendency to confuse compliance and security. The SANS Top 20 Critical Security Controls gives security professionals, system administrators, and business decision makers ways to actually improve security while achieving compliance. In this session, Rees Bevan, CISSP will present an overview of the Top 20 and discuss the controls Target could have used to minimize the effects of their now famous data breach.
How much does a security breach really cost your business? CAaNES President, Mark Fidel looks at the various costs businesses can incur when their systems are compromised. About our Speaker: Mark Fidel About our hosts: bigbyte.cc bigbyte.cc provides our […]
Any tool, open source or fee (license) based is only as good as the people using them. There are good tools in both realms, and some better than others. I have seen some fantastic deployments of open source but you must have the expertise and TIME to deploy them and use them. There is no ‘point and click’ and certainly no ‘plug and play’ when it comes to this topic. This should highlight the truth about these topics: 95% of the problem is behind the keyboard – People.