I recently presented the following presentation at Manager-Tools.com's M-Conference 2024.:
"From The Dark Web To the Boardroom: Cybersecurity Strategies from 15 years of attending DEFCON" (PDF presentation download)
These are all the links I referenced in my presentation:
- https://www.technewsradio.com/2024/09/defcon-32-2024-notes-references.html
- https://media.defcon.org
- https://en.wikipedia.org/wiki/Sun_Tzu
- https://www.wired.com/story/russia-gru-unit-29155-hacker-team/
- https://www.infosecurity-magazine.com/news/malware-service-top-threat/
- https://www.helpnetsecurity.com/2024/02/02/ddos-attacks-h2-2023/
- https://www.nsa.gov/Podcast/
- https://stpetecatalyst.com/local-cybersecurity-firm-we-hired-a-north-korean-hacker/
- https://www.infosecurity-magazine.com/news/malware-service-top-threat/
- https://www.helpnetsecurity.com/2024/02/02/ddos-attacks-h2-2023/
- https://www.hivesystems.com/blog/are-your-passwords-in-the-green
- https://informationisbeautiful.net/visualizations/most-common-pin-codes/
- https://gizmodo.com/google-just-made-entering-passwords-on-desktop-a-thing-of-the-past-200050128
- https://www.aboutamazon.com/news/innovation-at-amazon/what-is-amazon-project-kuiper
- DEFCON Examples:
- https://www.blackhillsinfosec.com/satellite-hacking/
- ZERO TRUST
- https://dodcio.defense.gov/Portals/0/Documents/Library/CS-Ref-Architecture.pdf
- https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf
- https://dodcio.defense.gov/Portals/0/Documents/Library/ZeroTrustOverlays.pdf
- https://dodcio.defense.gov/Portals/0/Documents/Library/DoD-ZTStrategy.pdf
- https://www.bleepingcomputer.com/news/security/hackers-use-poc-exploits-in-attacks-22-minutes-after-release/
- CROWD STRIKE Updates/Patching Issues:
- https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/
- https://www.reddit.com/r/crowdstrike/comments/1e6vmkf/bsod_error_in_latest_crowdstrike_update/?rdt=35791
- https://x.com/Xaaavier_8613/status/1814180533108400569
- https://krebsonsecurity.com/2024/07/global-microsoft-meltdown-tied-to-bad-crowstrike-update/
- https://www.wired.com/story/microsoft-crowdstrike-outage-cash/
- https://www.wired.com/story/hospitals-crowdstrike-microsoft-it-outage-meltdown/
- https://www.wired.com/story/crowdstrike-windows-outage-airport-travel-delays/
- https://www.wired.com/story/crowdstrike-outage-update-windows/
- https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/
- https://owasp.org/www-project-top-ten/
- https://federalnewsnetwork.com/cybersecurity/2024/09/cisa-review-low-hanging-cyber-lapses-plague-critical-infrastructure/
- Bonus:
- AFCEA's "Cybersecurity in the Boardroom" resource (behind a soft paywall):
- Graphics:
- Backup Material
- https://arstechnica.com/security/2024/07/new-blast-radius-attack-breaks-30-year-old-protocol-used-in-networks-everywhere/
- https://krebsonsecurity.com/2024/08/local-networks-go-global-when-domain-names-collide/
- https://federalnewsnetwork.com/artificial-intelligence/2024/09/state-dept-looks-to-test-cyber-data-automation-project-by-years-end/
- https://informationsecuritybuzz.com/generative-ai-fuels-new-cyberattacks/
Let me know if you have any questions, comments, etc.
I am open to presenting this in other venues if you are interested. Just let me know!
Here are my 





