ºÝºÝߣshows by User: infosecresearch / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: infosecresearch / Fri, 12 Jun 2020 14:06:42 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: infosecresearch Cracking for the Blue Team /slideshow/cracking-for-the-blue-team/235485963 havoc1-200612140642
In this session we will generally move through three sections 1) Automation of the lab environment a) the why b) the how 2) External audit and password complexity rules 3) Windows password cracking when the minimum length is set at 12 char]]>

In this session we will generally move through three sections 1) Automation of the lab environment a) the why b) the how 2) External audit and password complexity rules 3) Windows password cracking when the minimum length is set at 12 char]]>
Fri, 12 Jun 2020 14:06:42 GMT /slideshow/cracking-for-the-blue-team/235485963 infosecresearch@slideshare.net(infosecresearch) Cracking for the Blue Team infosecresearch In this session we will generally move through three sections 1) Automation of the lab environment a) the why b) the how 2) External audit and password complexity rules 3) Windows password cracking when the minimum length is set at 12 char <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/havoc1-200612140642-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session we will generally move through three sections 1) Automation of the lab environment a) the why b) the how 2) External audit and password complexity rules 3) Windows password cracking when the minimum length is set at 12 char
Cracking for the Blue Team from James '​-- Mckinlay
]]>
64 0 https://cdn.slidesharecdn.com/ss_thumbnails/havoc1-200612140642-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security at the speed of dev ops v3 /slideshow/security-at-the-speed-of-dev-ops-v3/130808501 securityatthespeedofdevopsv3-190206221213
DevOps tools for security as well as SecOps tools for development]]>

DevOps tools for security as well as SecOps tools for development]]>
Wed, 06 Feb 2019 22:12:13 GMT /slideshow/security-at-the-speed-of-dev-ops-v3/130808501 infosecresearch@slideshare.net(infosecresearch) Security at the speed of dev ops v3 infosecresearch DevOps tools for security as well as SecOps tools for development <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityatthespeedofdevopsv3-190206221213-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DevOps tools for security as well as SecOps tools for development
Security at the speed of dev ops v3 from James '​-- Mckinlay
]]>
198 1 https://cdn.slidesharecdn.com/ss_thumbnails/securityatthespeedofdevopsv3-190206221213-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
40 things to do before you spend $1 on AI /slideshow/40-things-to-do-before-you-spend-1-on-ai/107706180 20180629aiforum169-180727105232
AI has its place in cybersecurity - but please fix the basics first]]>

AI has its place in cybersecurity - but please fix the basics first]]>
Fri, 27 Jul 2018 10:52:32 GMT /slideshow/40-things-to-do-before-you-spend-1-on-ai/107706180 infosecresearch@slideshare.net(infosecresearch) 40 things to do before you spend $1 on AI infosecresearch AI has its place in cybersecurity - but please fix the basics first <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20180629aiforum169-180727105232-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> AI has its place in cybersecurity - but please fix the basics first
40 things to do before you spend $1 on AI from James '​-- Mckinlay
]]>
351 3 https://cdn.slidesharecdn.com/ss_thumbnails/20180629aiforum169-180727105232-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Smart Cities /slideshow/securing-smart-cities/82665302 ssc-15-things-v1-171124165736
Cybersecurity of Smart Cities is a controversial topic today. Researchers and professionals are debating the viability and sustainability of a large complex environment, which heavily relies on the digital infrastructure, especially from a cybersecurity perspective. Smart cities continuously deploy and update information and communication technology (ICT) to enhance the quality of life for citizens. ]]>

Cybersecurity of Smart Cities is a controversial topic today. Researchers and professionals are debating the viability and sustainability of a large complex environment, which heavily relies on the digital infrastructure, especially from a cybersecurity perspective. Smart cities continuously deploy and update information and communication technology (ICT) to enhance the quality of life for citizens. ]]>
Fri, 24 Nov 2017 16:57:36 GMT /slideshow/securing-smart-cities/82665302 infosecresearch@slideshare.net(infosecresearch) Securing Smart Cities infosecresearch Cybersecurity of Smart Cities is a controversial topic today. Researchers and professionals are debating the viability and sustainability of a large complex environment, which heavily relies on the digital infrastructure, especially from a cybersecurity perspective. Smart cities continuously deploy and update information and communication technology (ICT) to enhance the quality of life for citizens. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ssc-15-things-v1-171124165736-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cybersecurity of Smart Cities is a controversial topic today. Researchers and professionals are debating the viability and sustainability of a large complex environment, which heavily relies on the digital infrastructure, especially from a cybersecurity perspective. Smart cities continuously deploy and update information and communication technology (ICT) to enhance the quality of life for citizens.
Securing Smart Cities from James '​-- Mckinlay
]]>
213 2 https://cdn.slidesharecdn.com/ss_thumbnails/ssc-15-things-v1-171124165736-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
cybersecurity-workforce-papers /slideshow/cybersecurityworkforcepapers/68235788 cwf-161105121407
cybersecurity workforce papers]]>

cybersecurity workforce papers]]>
Sat, 05 Nov 2016 12:14:07 GMT /slideshow/cybersecurityworkforcepapers/68235788 infosecresearch@slideshare.net(infosecresearch) cybersecurity-workforce-papers infosecresearch cybersecurity workforce papers <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cwf-161105121407-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> cybersecurity workforce papers
cybersecurity-workforce-papers from James '​-- Mckinlay
]]>
92 4 https://cdn.slidesharecdn.com/ss_thumbnails/cwf-161105121407-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Good-cyber-hygiene-at-scale-and-speed /slideshow/goodcyberhygieneatscaleandspeed/67081892 goodcyberhygieneorig-161012171244
VMASS datacenter cyber hygiene fix the basics information security]]>

VMASS datacenter cyber hygiene fix the basics information security]]>
Wed, 12 Oct 2016 17:12:44 GMT /slideshow/goodcyberhygieneatscaleandspeed/67081892 infosecresearch@slideshare.net(infosecresearch) Good-cyber-hygiene-at-scale-and-speed infosecresearch VMASS datacenter cyber hygiene fix the basics information security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/goodcyberhygieneorig-161012171244-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> VMASS datacenter cyber hygiene fix the basics information security
Good-cyber-hygiene-at-scale-and-speed from James '​-- Mckinlay
]]>
336 4 https://cdn.slidesharecdn.com/ss_thumbnails/goodcyberhygieneorig-161012171244-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GPDR_Get-Data-Protection-Right /slideshow/gpdrgetdataprotectionright/65938890 get-data-protection-right-160912151617
GPDR will be on us in a little over 18 months - time to check and execute your data governance and data security plans.]]>

GPDR will be on us in a little over 18 months - time to check and execute your data governance and data security plans.]]>
Mon, 12 Sep 2016 15:16:17 GMT /slideshow/gpdrgetdataprotectionright/65938890 infosecresearch@slideshare.net(infosecresearch) GPDR_Get-Data-Protection-Right infosecresearch GPDR will be on us in a little over 18 months - time to check and execute your data governance and data security plans. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/get-data-protection-right-160912151617-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> GPDR will be on us in a little over 18 months - time to check and execute your data governance and data security plans.
GPDR_Get-Data-Protection-Right from James '​-- Mckinlay
]]>
876 7 https://cdn.slidesharecdn.com/ss_thumbnails/get-data-protection-right-160912151617-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BsidesMCR_2016-what-can-infosec-learn-from-devops /slideshow/bsidesmcr2016whatcaninfoseclearnfromdevops/65467381 bsidesedit-160829134400
August 18th 2016 - What can Information Security learn from DevOps - James McKinlay]]>

August 18th 2016 - What can Information Security learn from DevOps - James McKinlay]]>
Mon, 29 Aug 2016 13:44:00 GMT /slideshow/bsidesmcr2016whatcaninfoseclearnfromdevops/65467381 infosecresearch@slideshare.net(infosecresearch) BsidesMCR_2016-what-can-infosec-learn-from-devops infosecresearch August 18th 2016 - What can Information Security learn from DevOps - James McKinlay <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidesedit-160829134400-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> August 18th 2016 - What can Information Security learn from DevOps - James McKinlay
BsidesMCR_2016-what-can-infosec-learn-from-devops from James '​-- Mckinlay
]]>
1972 4 https://cdn.slidesharecdn.com/ss_thumbnails/bsidesedit-160829134400-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Metrics evolution breakfast edition /slideshow/metrics-evolution-breakfast-edition/48192915 metricsevolution-breakfastedition-150515140821-lva1-app6892
Cyber Security Breakfast Briefing]]>

Cyber Security Breakfast Briefing]]>
Fri, 15 May 2015 14:08:21 GMT /slideshow/metrics-evolution-breakfast-edition/48192915 infosecresearch@slideshare.net(infosecresearch) Metrics evolution breakfast edition infosecresearch Cyber Security Breakfast Briefing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/metricsevolution-breakfastedition-150515140821-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Security Breakfast Briefing
Metrics evolution breakfast edition from James '​-- Mckinlay
]]>
588 4 https://cdn.slidesharecdn.com/ss_thumbnails/metricsevolution-breakfastedition-150515140821-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IGPC Data Breach Planning braindump /slideshow/igpc-data-breach-planning-braindump/41757112 igpcdatabreachbraindump-141119090220-conversion-gate02
ºÝºÝߣs from the Data Governance Exchange - Berlin - Nov14]]>

ºÝºÝߣs from the Data Governance Exchange - Berlin - Nov14]]>
Wed, 19 Nov 2014 09:02:20 GMT /slideshow/igpc-data-breach-planning-braindump/41757112 infosecresearch@slideshare.net(infosecresearch) IGPC Data Breach Planning braindump infosecresearch ºÝºÝߣs from the Data Governance Exchange - Berlin - Nov14 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/igpcdatabreachbraindump-141119090220-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ºÝºÝߣs from the Data Governance Exchange - Berlin - Nov14
IGPC Data Breach Planning braindump from James '​-- Mckinlay
]]>
538 4 https://cdn.slidesharecdn.com/ss_thumbnails/igpcdatabreachbraindump-141119090220-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Living with Determined Attackers MOSI Edition /slideshow/living-with-determined-attackers-mosi-edition/41404967 determinedattackerstw-141111074324-conversion-gate02
ºÝºÝߣ deck from the Security Pressures seminar held in Manchester Museum of Science and Industry, November 2014]]>

ºÝºÝߣ deck from the Security Pressures seminar held in Manchester Museum of Science and Industry, November 2014]]>
Tue, 11 Nov 2014 07:43:24 GMT /slideshow/living-with-determined-attackers-mosi-edition/41404967 infosecresearch@slideshare.net(infosecresearch) Living with Determined Attackers MOSI Edition infosecresearch ºÝºÝߣ deck from the Security Pressures seminar held in Manchester Museum of Science and Industry, November 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/determinedattackerstw-141111074324-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ºÝºÝߣ deck from the Security Pressures seminar held in Manchester Museum of Science and Industry, November 2014
Living with Determined Attackers MOSI Edition from James '​-- Mckinlay
]]>
679 5 https://cdn.slidesharecdn.com/ss_thumbnails/determinedattackerstw-141111074324-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments /slideshow/elitebcscloudandmobileriskassessments/37009423 elite-140715130055-phpapp02
ºÝºÝߣ deck for BCS Elite Manchester July 2014]]>

ºÝºÝߣ deck for BCS Elite Manchester July 2014]]>
Tue, 15 Jul 2014 13:00:55 GMT /slideshow/elitebcscloudandmobileriskassessments/37009423 infosecresearch@slideshare.net(infosecresearch) ELITE.BCS-Cloud-and-Mobile-Risk-Assessments infosecresearch ºÝºÝߣ deck for BCS Elite Manchester July 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/elite-140715130055-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ºÝºÝߣ deck for BCS Elite Manchester July 2014
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments from James '​-- Mckinlay
]]>
481 8 https://cdn.slidesharecdn.com/ss_thumbnails/elite-140715130055-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Living with the threat of Determined Attackers - RANT0214 /infosecresearch/living-with-the-threat-of-determined-attackers-rant0214 determinedattackersrant14-140215123356-phpapp02
Presentation ºÝºÝߣs from Manchester RANT 14-02-2014 ]]>

Presentation ºÝºÝߣs from Manchester RANT 14-02-2014 ]]>
Sat, 15 Feb 2014 12:33:56 GMT /infosecresearch/living-with-the-threat-of-determined-attackers-rant0214 infosecresearch@slideshare.net(infosecresearch) Living with the threat of Determined Attackers - RANT0214 infosecresearch Presentation ºÝºÝߣs from Manchester RANT 14-02-2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/determinedattackersrant14-140215123356-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation ºÝºÝߣs from Manchester RANT 14-02-2014
Living with the threat of Determined Attackers - RANT0214 from James '​-- Mckinlay
]]>
7192 9 https://cdn.slidesharecdn.com/ss_thumbnails/determinedattackersrant14-140215123356-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-infosecresearch-48x48.jpg?cb=1658407969 CISO , Head of Information Security, GDPR, PCIDSS, International Speaker , Advisory Board Member A senior cybersecurity leader, CISSP and ITIL qualified, with demonstrable experience in leading Information Security protection of international standards compliant 24/7 highly available systems in regulated environments. Working to ISO27001, ISO9001, NESA-IAS, PCIDSSv3.2 and P2PEv2. Recently responsible for the MSS/SOC/SIRT and DFIR at a leading T4 Datacentre and Managed IT Services organisation. uk.linkedin.com/in/jmck4cybersecurity https://cdn.slidesharecdn.com/ss_thumbnails/havoc1-200612140642-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cracking-for-the-blue-team/235485963 Cracking for the Blue ... https://cdn.slidesharecdn.com/ss_thumbnails/securityatthespeedofdevopsv3-190206221213-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-at-the-speed-of-dev-ops-v3/130808501 Security at the speed ... https://cdn.slidesharecdn.com/ss_thumbnails/20180629aiforum169-180727105232-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/40-things-to-do-before-you-spend-1-on-ai/107706180 40 things to do before...