Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014

Cybersecurity Leader | Consultant | Author | Cyber Investigator
Jan. 9, 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
Data Breach Lessons from 2013 -  Eric Vanderburg  - CodeMash 2014
1 of 11

More Related Content

Viewers also liked

μέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείουμέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείου
μέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείουDimitrios Kuloglu
Ego RigereEgo Rigere
Ego Rigerehumbertogomezsequeira
2016 OCB Pine Tree State Registration Form2016 OCB Pine Tree State Registration Form
2016 OCB Pine Tree State Registration FormScott Fleurant
Venid y vamos todosVenid y vamos todos
Venid y vamos todosi_lobmy
Op ampOp amp
Op ampIPA 2014
Viva maríaViva maría
Viva maríai_lobmy

Similar to Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014

Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Eric Vanderburg
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrimeDejan Jeremic
2014 mala powerpoint2014 mala powerpoint
2014 mala powerpointostach34
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Armstrong Teasdale
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Eric Vanderburg

Similar to Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014(20)

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg

More from Eric Vanderburg(20)

Recently uploaded

Understanding Wireguard, TLS and Workload IdentityUnderstanding Wireguard, TLS and Workload Identity
Understanding Wireguard, TLS and Workload IdentityChristian Posta
info_session_gdsc_tmsl .pptxinfo_session_gdsc_tmsl .pptx
info_session_gdsc_tmsl .pptxNikitaSingh741518
sap.pptxsap.pptx
sap.pptxSAP
Cloud Composer workshop at Airflow Summit 2023.pdfCloud Composer workshop at Airflow Summit 2023.pdf
Cloud Composer workshop at Airflow Summit 2023.pdfLeah Cole
Common WordPress APIs - Options APICommon WordPress APIs - Options API
Common WordPress APIs - Options APIJonathan Bossenger
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...
Document Understanding as Cloud APIs and Generative AI Pre-labeling Extractio...DianaGray10

Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014

Editor's Notes

  1. Risk and compliance budget: 2011 Risk and Compliance Outlook report from McAfee 65% stat from Fierce CIO. http://www.fiercecio.com/story/security-business-decision/2008-01-24Government cyber security budget: http://www.computerworld.com/s/article/9209461/Obama_seeks_big_boost_in_cybersecurity_spending?taxonomyId=82