Interview with Kai Axford, Speaker at GovSec 2012

Kai Axford will be speaking on two topics at GovSec which will be help on April 2 – 4 at the Washington Convention Center in Washington, DC. had the esteem opportunity to pick his brains. Listen below to the interview.


Listen to internet radio with SecurityOrb on Blog Talk Radio


How I “Pwn” Your Network: A Chat with a Social Engineer and Facility Breach Expert

In hacker jargon, pwn means to compromise or control, specifically another computer (server or PC), web site, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking.

Do you want to know what real hackers are doing to your infrastructure? Would you like to hear how we are able to evade all of your expensive security controls? Stop wondering and ask! In this highly interactive session, we’ll chat with a professional social engineer and facility breach expert, as they discuss what works and what doesn’t in protecting your infrastructure. You’ll hear what makes his jobs harder….and sometimes easier. Don’t miss this rare engagement!

Learning Points:

  1. Identify the tools and techniques used by social engineers.
  2. Understand the gaps between physical security and information security.
  3. Understand the information that is being made available by your employees to attackers

Understanding Computer Espionage: Targeted Espionage from within Your Organization

Many analysts have stated that the Number One issue facing corporate customers today is the threat of targeted espionage coming from within your organization. Join Kai Axford, a former Microsoft Senior Security Strategist, for this entertaining and engaging session. He’ll share real stories from the trenches about the risk this threat presents for both you and your customers. He’ll also demo the means by which these attacks occur and discuss the mindset of the attackers. Don’t miss the chance to see how this is done and what you can do to prevent it!

Learning Points:

1. Understand the attack vectors being used in conducting computer espionage

2. Learn why computer espionage is such a great risk to industry and to the U.S. critical infrastructure

3. Understand how to deter these attacks


0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.