Security programs that are "democratic" or "equal" when dealing with different business units, especially in a decentralized organization are bound to fail. Security, just like other forms of risk, should be applied in a way that maximizes the effectiveness of the program. In this session, we'll discuss some of the decision-making process around formulating a security program for such a decentralized organization and the lessons learned through that process.
About Iftach Ian Amit
Ian has over a decade of experience in hands-on and strategic roles, working across a diversity of security fields: business, industry, marketing, technical and research. Ian held senior leadership positions at Amazon, ZeroFOX, IOActive, Security-Art, Aladdin, Finjan and Datavantage. He is a sought-after subject matter and speaker at conferences such as Black Hat, DEF CON and InfoSecurity. He founded the Tel-Aviv DefCon chapter (DC9723) and also was a founding member of the Penetration Testing Execution Standard (PTES).
Comentarios