Response
4 Incident response plans
4 Security operations center
4 Digital forensics
4 Active mitigtaion
http://bit.ly/2tTOeu1 14
Slide 15
Slide 15 text
Case Studies
http://bit.ly/2tTOeu1 15
Slide 16
Slide 16 text
Denial of Service
http://bit.ly/2tTOeu1 16
Slide 17
Slide 17 text
http://bit.ly/2tTOeu1 17
Slide 18
Slide 18 text
http://bit.ly/2tTOeu1 18
Slide 19
Slide 19 text
Tips
4 Evaluate the risk
4 Maybe have a plan for dealing with a DDoS attack
http://bit.ly/2tTOeu1 19
Slide 20
Slide 20 text
Password Reuse
http://bit.ly/2tTOeu1 20
Slide 21
Slide 21 text
http://bit.ly/2tTOeu1 21
Slide 22
Slide 22 text
http://bit.ly/2tTOeu1 22
Slide 23
Slide 23 text
Tips
4 Use a password manager
4 Enable two-factor authentication everywhere
4 Resources
4 https://haveibeenpwned.com
4 https://opensource.com/article/17/2/password-
management
http://bit.ly/2tTOeu1 23
Slide 24
Slide 24 text
Software Patching
http://bit.ly/2tTOeu1 24
Slide 25
Slide 25 text
http://bit.ly/2tTOeu1 25
Slide 26
Slide 26 text
http://bit.ly/2tTOeu1 26
Slide 27
Slide 27 text
Tips
4 Turn on automatic updates
4 Don't dismiss or ignore updates
4 Keep all devices up to date
4 Help out those who aren't as security savvy
http://bit.ly/2tTOeu1 27