Why focus on potential zero day attacks, when the vast majority of successful attacks use known vulnerabilities? This short presentation includes a brief analysis of a successful attack on the US Government and then describes a number of common cyber security myths and their real world solutions. It ends by recommending a standard set of security controls that have been developed over many years by the US Department of Defense.
This event has passed.