Anatomy of a VoIP Hack and How to Prevent Them

Eric Jacksch As the popularity of VoIP continues to increase, individuals and businesses continue to suffer financial losses. Popular VoIP servers provide minimal security features and many compromises go completely undetected until fraud occurs. Using data from custom tools and live PBXs, this session will examine real-world attacks on

Read more

Don’t Spill Your Candy in the Lobby: Managing the Corporate Infosec Risks From Open Source Intelligence (OSINT)

Scott Wright In the reconnaissance phase of an attack, the attackers will use tools to gather information about a target organization. We often worry about what architectural vulnerabilities they can discover with scanning tools. But Open Source Intelligence (OSINT) is just as valuable to attackers, since it can be used to launch successful

Read more

Two years of Applying ITSG-33: Report from the Trenches

François Marinier As an IT security analyst, I have spent most of the past two years applying key processes and activities of ITSG-33 to real-life IT projects. From new infrastructure services to mission-critical business applications to changes to existing information systems, I had many opportunities to put ITSG-33 guidance to the test and

Read more

Rebuilding the Credibility of a Security Team

Paul Davis Many CISOs/CSO and Directors of Security Operations are facing the challenge of increased expectations, misplaced assumptions of responsibility and limited resources to deliver success.  This leads to increased frustration within the security teams who are striving to protect their organizations. The

Read more

SMASH the Status Quo to Increase National Cybersecurity

John Weigelt While security guidelines, frameworks, certifications, evaluations and other documentation often provides comprehensive direction of safeguards and controls, getting the guidance implemented by organizations at a national scale is difficult.  Despite the availability of security guidance since the 80s, even large technology

Read more