ShmooCon 2014: Uncovering Hacker Tactics in Modern Enterprises π
Explore key insights from ShmooCon 2014 on how hackers infiltrate and operate within enterprise environments. Watch the full video and stay ahead in cybersecurity!

Christiaan008
729 views β’ Apr 25, 2014

About this video
For more information visit: http://bit.ly/shmooc14
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speaker: Weasel
From the early days of the InfoSec industry to today there has been a constant seeping of deep-knowledge technologists into a slew of disciplines that are not primarily focused on the protection of enterprise assets.
This dialog will explore and question the contributors to the diminishing attractiveness of the enterprise as a logical career path for hackers. We will go over data that shows that shift from enterprises being a primary employer for hackers to being, at best, an early-career training ground. With things like specialized training, bug bounties, independent research, and certifications; it's feasible to develop a long InfoSec career that is funded by enterprise by-product without ever having ever held a security role in an enterprise.
We will go over some data that questions the benefits and validity of this model. There will be lots of audience interaction and the end result should be informative to all.
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speaker: Weasel
From the early days of the InfoSec industry to today there has been a constant seeping of deep-knowledge technologists into a slew of disciplines that are not primarily focused on the protection of enterprise assets.
This dialog will explore and question the contributors to the diminishing attractiveness of the enterprise as a logical career path for hackers. We will go over data that shows that shift from enterprises being a primary employer for hackers to being, at best, an early-career training ground. With things like specialized training, bug bounties, independent research, and certifications; it's feasible to develop a long InfoSec career that is funded by enterprise by-product without ever having ever held a security role in an enterprise.
We will go over some data that questions the benefits and validity of this model. There will be lots of audience interaction and the end result should be informative to all.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
729
Likes
9
Duration
28:51
Published
Apr 25, 2014
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now