Weaponizing Layer 8
Do you think users are the weakest link in the security chain? Here’s some duct tape to change that and to raise the bar for social engineers and other attackers.
Over the last few decades, sysadmins and people working in IT have called users names and generally rolled their eyes at the antics of those oh-so-uneducated people. From PEBKAC to DAU we called them names and didn’t want them on our networks. This way of destructive thinking needs an overhaul, and we are going to show some easy things how users can become the valuable asset in corporate security that indeed they should be.
Find out about some creative things companies have done to significantly raise their security, and how users can become a major asset of any security team.