This document discusses why security management is difficult by addressing several challenges:
- Incidents will likely occur when malicious emails are sent to many employees due to human errors. For example, there is a 63% probability of an incident if emails are sent to 100 employees.
- It is important to have proper processes for responding to incidents, including identifying compromised devices, analyzing logs and root causes, and documenting reports.
- Ongoing maintenance is required as new vulnerabilities are discovered and environments change. Legacy systems also require continuous management.
- Incident visibility and information sharing can be limited, making coordinated response difficult.
This document discusses why security management is difficult by addressing several challenges:
- Incidents will likely occur when malicious emails are sent to many employees due to human errors. For example, there is a 63% probability of an incident if emails are sent to 100 employees.
- It is important to have proper processes for responding to incidents, including identifying compromised devices, analyzing logs and root causes, and documenting reports.
- Ongoing maintenance is required as new vulnerabilities are discovered and environments change. Legacy systems also require continuous management.
- Incident visibility and information sharing can be limited, making coordinated response difficult.
This presentation is about Amazon Web Service(AWS) security incidents.
I gave this presentation in somewhere on February 21, 2015. When I uploaded this slides to slideshare, some slides were deleted or modified.
This document discusses various techniques for debugging custom Ansible modules including using verbose logging levels, the Boto debug setting, Python logging, the q debugging library, and the Python debugger pdb. It provides an example of debugging a custom ec2_describe module and outputs from using these debugging methods.
This presentation is about Amazon Web Service(AWS) security incidents.
I gave this presentation in somewhere on February 21, 2015. When I uploaded this slides to slideshare, some slides were deleted or modified.
This document discusses various techniques for debugging custom Ansible modules including using verbose logging levels, the Boto debug setting, Python logging, the q debugging library, and the Python debugger pdb. It provides an example of debugging a custom ec2_describe module and outputs from using these debugging methods.
The document discusses various privacy and security risks related to sharing information on social media. It mentions how metadata embedded in photos can reveal location data and mentions cases where too much personal information shared online led to identity theft or fraud. The document also lists some tips for safe social media usage such as disabling GPS and being aware of metadata in photos before posting online.