Description: Nathaniel Wieriks and George Stewart
Nathaniel is the Security Practice Manager with Intalock Technologies who sees an opportunity to bring together his risk management, security testing and incident response experience with effectively technology to provide his clients with business-focused security solutions. Through his experience of presenting, training and research Nathaniel has developed clear and concise communication skills which enable him to quickly identify business- and technical-related security issues while delivering efficient and cost-effective solutions.
George is an Associate Director and Principal Consultant at Saltbush Assurance a national security consultancy. He sees penetration testing as a passion rather than a job, with a focus on gateways and network infrastructure. In a previous life, George worked as a key member of the engineering team for an international vendor of secure web gateway appliances, and has extensive experience building and testing high performance technology to secure some of the largest gateways on the planet. George is a CREST registered tester, PCI QSA and has previously held GIAC GPEN qualifications.
The Modern Response: Hacker vs Defender
Hacker: There has always been a major focus on defending the perimeter of enterprise networks, resulting in attackers focusing on client-side exploits that target end-user applications including Adobe Reader, Internet Explorer and Java. Nathaniel will help us explore a simple technique that can be used to exfiltrate information from a corporate network, even when DSD’s top 4 recommendations have been implemented and the network is protected by a corporate gateway.
Defender: Trying to prevent this kind of infiltration is almost impossible and if attempted can lead to significant inflexibility and inefficiency for the business. There is a better way to reduce the risk of this kind of modern intrusion. Nathaniel will help us discover how this can be done.
For More Information Please Visit:- http://crikeycon.com/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.