ºÝºÝߣshows by User: Jonathansuldo / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Jonathansuldo / Fri, 01 May 2015 13:57:46 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Jonathansuldo Hacking appliances /slideshow/hacking-appliances/47657288 hackingappliances-150501135746-conversion-gate02
NolaCon talk Techniques for evading, defending, and audting security controls in enterprise appliances:UTM,SIEM,IDS/IPS,Cisco ASA, and NGFW]]>

NolaCon talk Techniques for evading, defending, and audting security controls in enterprise appliances:UTM,SIEM,IDS/IPS,Cisco ASA, and NGFW]]>
Fri, 01 May 2015 13:57:46 GMT /slideshow/hacking-appliances/47657288 Jonathansuldo@slideshare.net(Jonathansuldo) Hacking appliances Jonathansuldo NolaCon talk Techniques for evading, defending, and audting security controls in enterprise appliances:UTM,SIEM,IDS/IPS,Cisco ASA, and NGFW <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackingappliances-150501135746-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NolaCon talk Techniques for evading, defending, and audting security controls in enterprise appliances:UTM,SIEM,IDS/IPS,Cisco ASA, and NGFW
Hacking appliances from Jonathan Suldo
]]>
269 1 https://cdn.slidesharecdn.com/ss_thumbnails/hackingappliances-150501135746-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Jonathansuldo-48x48.jpg?cb=1682574831 I am a security person who comes at security from alI perspectives. In my professional career, I’ve been on both the defender/builder and attacker/assessor sides of the fence, and I use my experiences from each to inform my approach to the other. Overall, my passion is providing evidence-driven approaches. This manifests as research driven approaches, where i use knowledge of past, present, and future security issues to drive my advice. Presently, my focus is enabling, supporting, and assessing both the design and construction of secure solutions. Having spent time in all three of business, academic, and assessment context has enabled me to communicate the balance between what’s goo... http://arma-net.org