iSymposium 2018 - Live Hack with Ben and Kassie Holt
Talk given on 4/26 at Adobe campus in Lehi with three live hacking demonstrations that included a physical drive removal, Google Gruyere Privilege Escalation and Remote Desktop network scan and bruteforce attack.
Security Needs to Be “Baked-In” • How Do They Test Security? • What Responsibility do They Take? • What is Their Response Plan? • How Do They Store Your Data? Free Services Are Not Free - They Take No Responsibility
Mitigation: Training and Understanding • Policies are Only as Good as They Are Followed • Train for Understanding with Compliance • Limit Access • Use Two Factor Authentication • Exponential Backoff • Monitor Stupidity is a more dangerous enemy of the good than malice. One may protest against evil; it can be exposed and, if need be, prevented by use of force. Evil always carries within itself the germ of its own subversion in that it leaves behind in human beings at least a sense of unease. Against stupidity we are defenseless. --DIETRICH BONHOEFFER