Starting with a brief history of security breaches and the impact to both companies and consumers. I move through a methodology of identifying sensitive information creating a risk matrix and what tools are available to mitigate information leaks.
Attack Vector: how does your information leak. Including an open and frank discussion of organized gangs (ie Anonymous)
Become a member of ODTUG to gain access to more than 12,500 files in our technical database.
- Not a member? Click through to the topic of interest to browse a list of available presentations.
- Already a member? Log-in here to access the full database
Click here to see the Full Techincal Resource Database