skip to main
|
skip to sidebar
The 8 Critical Success Actions for Infosec: Presentation
This presentation provides some tips about how to create an information security function. It is based on the paper titled '
Eight Critical Success Actions for Information Security
'.
Newer Post
Older Post
Home
Pages
Home
itsecuriteer's tweets (III)
itsecuriteer's tweets (II)
itsecuriteer's tweets (I)
Voki's book intro
Cyber Insurance Due Diligence
Cyber Insurance book by @itsecuriteer
Creating IT security teams
the book
Popular Posts
Student Notes: 3 Papers on complex networks vulnerabilities
This post compiles my notes on three Papers on vulnerabilities in complex networks: - "Multiscale vulnerability of complex networks &q...
Student Paper Notes: The structure and function of complex networks by M.E.J. Newman
This time the student notes I post are coming from the reading of a scientific paper written by Mark Newman , Professor of Physics in the Un...
Economics Book review: Bad Samaritans by Ha-Joon Chang - Reality vs hearsay - Similar in Infosec?
I am convinced that Information Security professionals can benefit from reading, not only Information Security books like this one or that ...
Book Review: How to be a modern scientist by @jtleek i.e. Jeffrey Leek
In the introduction to the Data Science world, one needs to build the right frame surrounding the topic. This is usually done via a set of ...
Security sites to bookmark: blog.didierstevens.com and rootshell.be
Belgium: Waffles... and security The professional activities that we undertake within our company, be it our own shop or our employer, can...
Security site to bookmark: www.lares.com
An elegant way to sell security Every now and then we need to get a chance to slow down our professional tactical everyday pace and think ...
Book Review: Executive Data Science by Brian Caffo, Roger D. Peng and Jeffrey Leek
In the introduction to the Data Science world, one needs to build the right frame surrounding the topic. This is usually done via a set of ...
Applying persuasion to information security
Social Psychology Professor Scott Plous mentioned a very enlightening almost 12-minute video on the " Science of Persuasion " by ...
Security site to bookmark: www.secdocs.org
A valuable security research repository Every single week, somewhere in the world, a security conference or presentation takes place. Att...
Book review: The wisdom of crowds - A leveraging tool
The book by James Surowiecki titled " The wisdom of crowds " fell into my hands and I read it during the summer of 2015. These ar...
Follow me on twitter!
Contact (e.g. to speak at your event)
itsecuriteer at gmail.com
Views
Search this blog
Labels
7z
(1)
access point
(1)
AES
(1)
aircrack
(1)
airmon
(1)
airodump
(1)
alsamixer
(1)
android
(2)
anti-fragility
(1)
antivirus
(1)
apple
(1)
applications
(1)
arp
(1)
arp-poisoning
(1)
arpwatch
(1)
articles
(1)
audacity
(1)
audio
(1)
authenticity
(1)
availability
(1)
baby steps
(1)
Backtrack 3
(1)
banking
(1)
bitcoin
(3)
black hat
(1)
blockchain
(2)
body language
(1)
book
(2)
book review
(35)
bookmark
(1)
books
(1)
bootup
(1)
Brian Krebs
(1)
bridge
(1)
business
(3)
CERT
(1)
charisma
(1)
cigtr
(1)
clamav
(1)
command line
(2)
communication
(2)
complex networks
(9)
compression
(1)
cookie
(2)
cpu
(1)
creating
(1)
crowds
(1)
crypto
(1)
cyber attacks
(1)
cyber insurance
(1)
cybercrime
(1)
cyberwar
(2)
data analysis
(1)
data privacy
(1)
data science
(3)
datalossdb.org
(1)
ddclient
(1)
degree
(1)
details
(1)
devops
(1)
dhcp
(1)
dlls
(1)
drivers
(1)
DSL
(1)
easytag
(1)
economics
(3)
elgamal
(1)
elicitation
(1)
empathy
(1)
enchantment
(1)
encryption
(3)
entrepreneur
(3)
entropy
(1)
errata
(1)
espionage
(1)
exif data
(1)
extract
(1)
ffmpeg
(1)
firesheep
(1)
firestarter
(1)
firewall
(1)
flash
(1)
flow analysis
(1)
flv
(1)
forensics
(2)
fragility
(1)
future
(1)
geo-location
(1)
gnome-alsamixer
(1)
google
(2)
governments
(1)
gps coordinates
(1)
gray hacking
(1)
Guest Additions
(1)
help
(1)
holistic
(1)
infosec leaders
(3)
innovation
(4)
instant messaging
(1)
intelligence
(2)
internet
(2)
intuition
(1)
IP address
(2)
IT security function
(5)
IT security management
(4)
itsecuriteer
(4)
java
(1)
jobs
(1)
KPIs
(1)
leading geeks book review
(1)
learning
(1)
lecture
(1)
likeable
(1)
linux
(4)
logs
(1)
lost data
(1)
mac
(1)
mac times
(1)
measuring security
(1)
metasploit
(1)
Michael Lucas
(1)
mindlessness
(2)
models
(1)
monitor
(1)
moving
(1)
Moxie
(1)
mp3
(1)
net flows
(1)
network
(1)
network science
(9)
next generation hacking
(1)
ninja
(1)
nmap
(1)
node
(1)
notary
(1)
openioc
(1)
operational security
(1)
owasp
(1)
paella
(1)
paper
(1)
passphrase
(1)
password
(1)
patching
(1)
pauldotcom podcast
(1)
pentesting
(3)
persistence
(1)
persuasion
(2)
physical machine
(1)
podcast
(1)
ports
(1)
power law
(1)
pra
(1)
pretexting
(1)
preventive measures
(2)
privacy
(2)
probabilistic risk assessment
(2)
process explorer
(1)
process hacker
(1)
processes
(2)
product security
(1)
public dns
(1)
publishing
(1)
python
(2)
ransomware
(1)
rapport
(1)
rc.local
(1)
reading
(1)
recommended sites
(5)
reddit
(1)
registration
(1)
remote
(1)
reputation
(1)
resilience
(2)
risk management
(5)
robustness
(2)
ross anderson
(1)
router
(1)
ruby
(1)
schneier
(1)
secrecy
(1)
secure it up
(1)
security
(1)
security bloggers network
(1)
security sites
(10)
security tests
(1)
sensors
(1)
server
(1)
service provider
(1)
SIC
(1)
silent
(1)
site reliability engineering
(1)
sleep
(1)
snmp
(1)
social engineering
(10)
sound
(1)
Spanish
(1)
sql injection
(1)
squareup
(1)
ssh
(1)
ssl
(1)
stanford podcast
(1)
statistics
(1)
status quo
(1)
Stiennon
(1)
student notes
(8)
survivability
(1)
team
(2)
threats
(4)
tools
(2)
tribe
(1)
trust
(1)
trustworthy
(1)
tuning
(1)
twitter
(2)
ubuntu
(3)
ubuntu 8.10
(1)
ubuntu 9.10
(1)
unattended-upgrades
(1)
unix
(1)
update
(1)
update manager
(1)
updates
(1)
upgrade
(1)
usage
(1)
USB drive
(2)
user friendliness
(1)
vdi file
(1)
video
(1)
videos
(1)
virtual machine
(1)
virtualbox
(3)
virtualisation
(1)
VMware converter
(1)
VMware player
(1)
vulnerability
(2)
vulnerability assessment
(1)
web app
(1)
whatsapp
(1)
wifi
(1)
wireless
(1)
wisdom
(1)
WPA
(1)
WPA2
(1)
Archive
►
2018
(4)
►
November
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2017
(13)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(2)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2016
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2015
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2014
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2013
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2012
(12)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2011
(14)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(2)
►
July
(2)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2010
(16)
►
December
(1)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(2)
►
July
(3)
►
June
(2)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2009
(10)
►
October
(2)
►
September
(1)
►
August
(1)
►
July
(1)
►
June
(1)
►
May
(1)
►
April
(1)
►
March
(1)
►
February
(1)
►
2008
(2)
►
December
(1)
►
June
(1)
▼
2007
(5)
▼
December
(4)
Enterprise risk management
Information Systems Security sites
Security papers
The 8 Critical Success Actions for Infosec: Presen...
►
May
(1)
►
2006
(16)
►
December
(16)
Useful security links
hackingdistributed.com
securosis.com
edge.org
thefinancialbrand.com
blueliv.com
darkmatters.norsecorp.com
fireeye.com
troyhunt.com
lares.com
openioc.org
bugcrowd.com
hackerone.com
blueliv.com/blog-news/
darkmatters.norsecorp.com
fireeye.com/blog
securityerrata.org
rootshell.be
blog.didierstevens.com
secdocs.org
grahamcluley.com
krebsonsecurity.com
analysisintelligence.com
pentest-standard.org
reddit.com/r/netsec
wtfuzz.com
rationalsurvivability.com
measurablesecurity.mitre.org
datalossdb.org
cert.europa.eu
pentestit.com
securityninja.co.uk
zeltser.com
infosecisland.com
securitywizardry.com
shadowserver.org
ha.ckers.org
darkreading.com
ethicalhacker.net
jarlsberg.appspot.com
socialengineer.org
taosecurity.blogspot.com
gnucitizen.org
commandlinekungfu.com
sans.org
irongeek
pauldotcom
internet storm center
introducing this blog
el lado del mal
securehomepc
protegetupc
About the author