Speaker

John Aron

John Aron

We Speak IT®

Cleveland, Ohio, United States

Actions

Offensive and defensive security since 1994, there are cracks in most solutions. We'd like to share issues with Zero Trust and 2FA.

Area of Expertise

  • Government, Social Sector & Education
  • Information & Communications Technology
  • Media & Information

Topics

  • InfoSec
  • Defense in Depth
  • Information Security Governance and Risk

Don't lose control of your security controls and identity

In an era where threats have become very common and sophisticated, bugs in software create catastrophic consequences and your data is further at risk of exploitation. How could you increase defenses, and actually prevent data and identity leaks? How can you actually defend what matters?

Though really, how do you enhance security? Compliance is a changing target, how do you get that right? If the average time to find a breach is 246 days, 83% of compliant companies pay their insurance for ransomware, and 1/5th of CISOs actually believe in compliance efforts, what could you do when your face and behavior is known to the adversaries?

At a recent RSA talk, this talk will focus on adding humor to the advanced and annoying persistent threat. Being careful of what the next threat could be, we make humor in light of the adversaries and show them the light of proper ethics, to do the right thing.

Thor is a solution that increases defenses while enhancing security and compliance efforts across operating environments. Protect and control systems across domains - even as environments and your identity increase in scale.

Aronetics is fighting the fog of cyber war with bytes, not bullets. Be careful of where that data stream is pointing.

Sailing the Seas of Stolen Identities

The internet has become a nightmare. In the 80s and 90s, it was supposed to deliver information equality and social utopia, yet presently, the internet is used as a tool in cyber warfare, the ethereal fifth domain of conflict. Did you really want to talk about the war? Dark new fantasies and ideas about the internet — with the puppet strings that stretch from the Kremlin to Beijing to Palo Alto — are often just as ridiculous as the sunny visions they attempt to replace. Venture capitalists eagerly invested in social media without regard to how your identity would be used and abused or impact future national defense. Worldwide hacker communities' culture shifted as they dissolved with the adoption of internet users everywhere, every house and person nearly has a mobile phone now. We are now stuck in a paradigm of multiple gaps. Let’s explore alternative strategies – and add a shape to return to what was supposed to be.

John Aron

We Speak IT®

Cleveland, Ohio, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top