Avoiding Insidious Points of Compromise in Infrastructure Access Systems
Security BSides San Francisco via YouTube
AI, Data Science & Business Certificates from Google, IBM & Microsoft
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore war stories and gain insights into building secure infrastructure access systems in this 25-minute conference talk from BSidesSF 2022. Delve into five classic security incidents: FluffyBunny (2001), Operation Aurora (2009), DigiNotar (2011), NotPetya (2017), and SolarWinds (2020). Discover why these incidents challenge the industry's definition of "zero-trust" and learn valuable lessons for improving your organization's security posture. Cover key topics including bastions, Operation Aurora, Zero Trust, and the SolarWinds attack, as speaker Sharon Goldberg shares expertise on avoiding insidious points of compromise in infrastructure access systems.
Syllabus
Introduction
Bastions
Operation Aurora
Zero Trust
SolarWinds
Taught by
Security BSides San Francisco