Interview with Kai Axford, Speaker at GovSec 2012
Kai Axford will be speaking on two topics at GovSec which will be help on April 2 – 4 at the Washington Convention Center in Washington, DC. SecurityOrb.com had the esteem opportunity to pick his brains. Listen below to the interview.
How I “Pwn” Your Network: A Chat with a Social Engineer and Facility Breach Expert
In hacker jargon, pwn means to compromise or control, specifically another computer (server or PC), web site, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking.
Do you want to know what real hackers are doing to your infrastructure? Would you like to hear how we are able to evade all of your expensive security controls? Stop wondering and ask! In this highly interactive session, we’ll chat with a professional social engineer and facility breach expert, as they discuss what works and what doesn’t in protecting your infrastructure. You’ll hear what makes his jobs harder….and sometimes easier. Don’t miss this rare engagement!
- Identify the tools and techniques used by social engineers.
- Understand the gaps between physical security and information security.
- Understand the information that is being made available by your employees to attackers
Understanding Computer Espionage: Targeted Espionage from within Your Organization
Many analysts have stated that the Number One issue facing corporate customers today is the threat of targeted espionage coming from within your organization. Join Kai Axford, a former Microsoft Senior Security Strategist, for this entertaining and engaging session. He’ll share real stories from the trenches about the risk this threat presents for both you and your customers. He’ll also demo the means by which these attacks occur and discuss the mindset of the attackers. Don’t miss the chance to see how this is done and what you can do to prevent it!
1. Understand the attack vectors being used in conducting computer espionage
2. Learn why computer espionage is such a great risk to industry and to the U.S. critical infrastructure
3. Understand how to deter these attacks
Leave a ReplyWant to join the discussion?
Feel free to contribute!