際際滷shows by User: DavidEtue / http://www.slideshare.net/images/logo.gif 際際滷shows by User: DavidEtue / Thu, 17 Sep 2015 10:22:38 GMT 際際滷Share feed for 際際滷shows by User: DavidEtue Rugged Building Materials and Creating Agility with Security /slideshow/rugged-building-materials-and-creating-agility-with-security/52884216 gotoldn15ruggedbuildingmaterialsandcreatingagilitywithsecurity-150917102239-lva1-app6892
Presented at GOTO London 2015 (#gotoldn) in rugged DevOops track]]>

Presented at GOTO London 2015 (#gotoldn) in rugged DevOops track]]>
Thu, 17 Sep 2015 10:22:38 GMT /slideshow/rugged-building-materials-and-creating-agility-with-security/52884216 DavidEtue@slideshare.net(DavidEtue) Rugged Building Materials and Creating Agility with Security DavidEtue Presented at GOTO London 2015 (#gotoldn) in rugged DevOops track <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gotoldn15ruggedbuildingmaterialsandcreatingagilitywithsecurity-150917102239-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at GOTO London 2015 (#gotoldn) in rugged DevOops track
Rugged Building Materials and Creating Agility with Security from David Etue
]]>
738 5 https://cdn.slidesharecdn.com/ss_thumbnails/gotoldn15ruggedbuildingmaterialsandcreatingagilitywithsecurity-150917102239-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control /slideshow/whose-cloud-is-it-anyway-exploring-data-security-ownership-and-control/40747710 isse2014etuewhosecloudisitanyway-141026202059-conversion-gate01
Whose cloud is it anyway? Exploring data security, ownership and control as presented at ISSE EU 2014 Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. Cloud security conversations often focus on technical risk from other users of the clouds pooled resources, or vulnerabilities in the application and virtualization layers. The more important conversation is likely around data control, ownership, and identity management as the resource pooling and abstraction to address risks from cloud users, cloud administrators, law enforcement, intelligence agencies and a pantheon of adversaries. In all these organizations there is an increase in the latest technologies that could possibly jeopardize security. There are trends with using unsecure cloud services and bring your own devices that often make these organizations vulnerable to risks. In todays technological world it is not a matter of if the data will be compromised but when it will be compromised and what these groups can do to protect the data when this happens. This discussion will tackle the complex issues around data ownership and control. If data is destiny, then too many people are in charge of your fate. We discuss how to get it back.]]>

Whose cloud is it anyway? Exploring data security, ownership and control as presented at ISSE EU 2014 Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. Cloud security conversations often focus on technical risk from other users of the clouds pooled resources, or vulnerabilities in the application and virtualization layers. The more important conversation is likely around data control, ownership, and identity management as the resource pooling and abstraction to address risks from cloud users, cloud administrators, law enforcement, intelligence agencies and a pantheon of adversaries. In all these organizations there is an increase in the latest technologies that could possibly jeopardize security. There are trends with using unsecure cloud services and bring your own devices that often make these organizations vulnerable to risks. In todays technological world it is not a matter of if the data will be compromised but when it will be compromised and what these groups can do to protect the data when this happens. This discussion will tackle the complex issues around data ownership and control. If data is destiny, then too many people are in charge of your fate. We discuss how to get it back.]]>
Sun, 26 Oct 2014 20:20:59 GMT /slideshow/whose-cloud-is-it-anyway-exploring-data-security-ownership-and-control/40747710 DavidEtue@slideshare.net(DavidEtue) Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control DavidEtue Whose cloud is it anyway? Exploring data security, ownership and control as presented at ISSE EU 2014 Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. Cloud security conversations often focus on technical risk from other users of the clouds pooled resources, or vulnerabilities in the application and virtualization layers. The more important conversation is likely around data control, ownership, and identity management as the resource pooling and abstraction to address risks from cloud users, cloud administrators, law enforcement, intelligence agencies and a pantheon of adversaries. In all these organizations there is an increase in the latest technologies that could possibly jeopardize security. There are trends with using unsecure cloud services and bring your own devices that often make these organizations vulnerable to risks. In todays technological world it is not a matter of if the data will be compromised but when it will be compromised and what these groups can do to protect the data when this happens. This discussion will tackle the complex issues around data ownership and control. If data is destiny, then too many people are in charge of your fate. We discuss how to get it back. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isse2014etuewhosecloudisitanyway-141026202059-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Whose cloud is it anyway? Exploring data security, ownership and control as presented at ISSE EU 2014 Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. Cloud security conversations often focus on technical risk from other users of the clouds pooled resources, or vulnerabilities in the application and virtualization layers. The more important conversation is likely around data control, ownership, and identity management as the resource pooling and abstraction to address risks from cloud users, cloud administrators, law enforcement, intelligence agencies and a pantheon of adversaries. In all these organizations there is an increase in the latest technologies that could possibly jeopardize security. There are trends with using unsecure cloud services and bring your own devices that often make these organizations vulnerable to risks. In todays technological world it is not a matter of if the data will be compromised but when it will be compromised and what these groups can do to protect the data when this happens. This discussion will tackle the complex issues around data ownership and control. If data is destiny, then too many people are in charge of your fate. We discuss how to get it back.
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control from David Etue
]]>
513 1 https://cdn.slidesharecdn.com/ss_thumbnails/isse2014etuewhosecloudisitanyway-141026202059-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US 2013) /slideshow/grc-f41/40747636 xhrsq06vrf2k9sevnc6h-signature-360b38e6fc3a7cc561c3ae6a54a3c3ced6f94e97f6bce9bc16adaed0eb09217e-poli-141026201651-conversion-gate01
Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at RSAC US 2013 by @djetue and @joshcorman The security community has spent years on failed approaches to Return On Investment (ROI) on security offerings and Return On Security Investment (ROSI). Its failed as it evaluates from the wrong perspective. This session flips ROI on its head, looking from the adversarys perspective. Well introduce an Adversary ROI model, and show how it can change how you evaluate cyber security investment.]]>

Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at RSAC US 2013 by @djetue and @joshcorman The security community has spent years on failed approaches to Return On Investment (ROI) on security offerings and Return On Security Investment (ROSI). Its failed as it evaluates from the wrong perspective. This session flips ROI on its head, looking from the adversarys perspective. Well introduce an Adversary ROI model, and show how it can change how you evaluate cyber security investment.]]>
Sun, 26 Oct 2014 20:16:51 GMT /slideshow/grc-f41/40747636 DavidEtue@slideshare.net(DavidEtue) Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US 2013) DavidEtue Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at RSAC US 2013 by @djetue and @joshcorman The security community has spent years on failed approaches to Return On Investment (ROI) on security offerings and Return On Security Investment (ROSI). Its failed as it evaluates from the wrong perspective. This session flips ROI on its head, looking from the adversarys perspective. Well introduce an Adversary ROI model, and show how it can change how you evaluate cyber security investment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/xhrsq06vrf2k9sevnc6h-signature-360b38e6fc3a7cc561c3ae6a54a3c3ced6f94e97f6bce9bc16adaed0eb09217e-poli-141026201651-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at RSAC US 2013 by @djetue and @joshcorman The security community has spent years on failed approaches to Return On Investment (ROI) on security offerings and Return On Security Investment (ROSI). Its failed as it evaluates from the wrong perspective. This session flips ROI on its head, looking from the adversarys perspective. Well introduce an Adversary ROI model, and show how it can change how you evaluate cyber security investment.
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US 2013) from David Etue
]]>
719 2 https://cdn.slidesharecdn.com/ss_thumbnails/xhrsq06vrf2k9sevnc6h-signature-360b38e6fc3a7cc561c3ae6a54a3c3ced6f94e97f6bce9bc16adaed0eb09217e-poli-141026201651-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker Halted 2014) /slideshow/hh-2014-etuecontrolquotient/40747524 hh2014etuecontrolquotient-141026201158-conversion-gate01
Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at Hacker Halted 2014 on October 17, 2014 (https://www.hackerhalted.com/2014/us/?page_id=1174) Abstract: Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control weve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.]]>

Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at Hacker Halted 2014 on October 17, 2014 (https://www.hackerhalted.com/2014/us/?page_id=1174) Abstract: Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control weve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.]]>
Sun, 26 Oct 2014 20:11:58 GMT /slideshow/hh-2014-etuecontrolquotient/40747524 DavidEtue@slideshare.net(DavidEtue) Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker Halted 2014) DavidEtue Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at Hacker Halted 2014 on October 17, 2014 (https://www.hackerhalted.com/2014/us/?page_id=1174) Abstract: Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control weve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hh2014etuecontrolquotient-141026201158-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at Hacker Halted 2014 on October 17, 2014 (https://www.hackerhalted.com/2014/us/?page_id=1174) Abstract: Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control weve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.
Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker Halted 2014) from David Etue
]]>
615 2 https://cdn.slidesharecdn.com/ss_thumbnails/hh2014etuecontrolquotient-141026201158-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Not Go Quietly: Surprising Strategies and Teammates to Adapt and Overcome /slideshow/not-go-quietly-surprising-strategies-and-teammates-to-adapt-and-overcome-for-slide-share/36145258 notgoquietly-surprisingstrategiesandteammatestoadaptandovercomeforslideshare-140621135007-phpapp01
This is a current version of a presentation that @JoshCorman and I have given at RSAC US 2014 and via BrightTalk. "Nearly every aspect of our job as defenders has gotten more difficult and more complexescalating threat, massive IT change, burdensome compliance reporting, all with stagnant security budgets and headcount. Rather than surrender, its now time to fight back. This session will provide new approaches to finding financial and operational support for information security across the organization." This has been presented at the RSA Conference US 2014: http://www.rsaconference.com/events/us14/agenda/sessions/1151/not-go-quietly-surprising-strategies-and-teammates And via BrightTalk via alternative title "The Cyber Security Playbook: Securing Budget and Forming Allies" (replay available): https://www.brighttalk.com/webcast/2037/112537]]>

This is a current version of a presentation that @JoshCorman and I have given at RSAC US 2014 and via BrightTalk. "Nearly every aspect of our job as defenders has gotten more difficult and more complexescalating threat, massive IT change, burdensome compliance reporting, all with stagnant security budgets and headcount. Rather than surrender, its now time to fight back. This session will provide new approaches to finding financial and operational support for information security across the organization." This has been presented at the RSA Conference US 2014: http://www.rsaconference.com/events/us14/agenda/sessions/1151/not-go-quietly-surprising-strategies-and-teammates And via BrightTalk via alternative title "The Cyber Security Playbook: Securing Budget and Forming Allies" (replay available): https://www.brighttalk.com/webcast/2037/112537]]>
Sat, 21 Jun 2014 13:50:07 GMT /slideshow/not-go-quietly-surprising-strategies-and-teammates-to-adapt-and-overcome-for-slide-share/36145258 DavidEtue@slideshare.net(DavidEtue) Not Go Quietly: Surprising Strategies and Teammates to Adapt and Overcome DavidEtue This is a current version of a presentation that @JoshCorman and I have given at RSAC US 2014 and via BrightTalk. "Nearly every aspect of our job as defenders has gotten more difficult and more complexescalating threat, massive IT change, burdensome compliance reporting, all with stagnant security budgets and headcount. Rather than surrender, its now time to fight back. This session will provide new approaches to finding financial and operational support for information security across the organization." This has been presented at the RSA Conference US 2014: http://www.rsaconference.com/events/us14/agenda/sessions/1151/not-go-quietly-surprising-strategies-and-teammates And via BrightTalk via alternative title "The Cyber Security Playbook: Securing Budget and Forming Allies" (replay available): https://www.brighttalk.com/webcast/2037/112537 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/notgoquietly-surprisingstrategiesandteammatestoadaptandovercomeforslideshare-140621135007-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a current version of a presentation that @JoshCorman and I have given at RSAC US 2014 and via BrightTalk. &quot;Nearly every aspect of our job as defenders has gotten more difficult and more complexescalating threat, massive IT change, burdensome compliance reporting, all with stagnant security budgets and headcount. Rather than surrender, its now time to fight back. This session will provide new approaches to finding financial and operational support for information security across the organization.&quot; This has been presented at the RSA Conference US 2014: http://www.rsaconference.com/events/us14/agenda/sessions/1151/not-go-quietly-surprising-strategies-and-teammates And via BrightTalk via alternative title &quot;The Cyber Security Playbook: Securing Budget and Forming Allies&quot; (replay available): https://www.brighttalk.com/webcast/2037/112537
Not Go Quietly: Surprising Strategies and Teammates to Adapt and Overcome from David Etue
]]>
910 6 https://cdn.slidesharecdn.com/ss_thumbnails/notgoquietly-surprisingstrategiesandteammatestoadaptandovercomeforslideshare-140621135007-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-DavidEtue-48x48.jpg?cb=1686065787 profile.david.etue.net https://cdn.slidesharecdn.com/ss_thumbnails/gotoldn15ruggedbuildingmaterialsandcreatingagilitywithsecurity-150917102239-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/rugged-building-materials-and-creating-agility-with-security/52884216 Rugged Building Materi... https://cdn.slidesharecdn.com/ss_thumbnails/isse2014etuewhosecloudisitanyway-141026202059-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/whose-cloud-is-it-anyway-exploring-data-security-ownership-and-control/40747710 Whose Cloud Is It Anyw... https://cdn.slidesharecdn.com/ss_thumbnails/xhrsq06vrf2k9sevnc6h-signature-360b38e6fc3a7cc561c3ae6a54a3c3ced6f94e97f6bce9bc16adaed0eb09217e-poli-141026201651-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/grc-f41/40747636 Control Quotient: Adap...