Overview
Syllabus
Intro
Iras first experience speaking in the Bible Belt
Why this presentation came about
Why the hype matters
Did your security program really suck
Sophisticated attacks
Use hype to your advantage
Hacking Team
Was this sophisticated
IRS breach
What do they need
Ashley Madison
SQL Injection
ISIS Hacks
Anthem Hack
Watering Hole Attack
The Detection Deficit Disorder
The IRS Attack
The IRI Rules
Common Vulnerabilities
Advanced Persistent Threats
Risk Management
Impolite Failure
Potential Loss
Security Budget
Multifactor Authentication
Assume Failure
Detection
Protection
Detecting
Security