It has been many years since I lived in Millington Tennessee, I was stationed at the Naval Air Station there for Ordnance school in 1992. A fresh 18 year old, just gaining independence and I probably could have used a lot more guidance. I rarely got to travel to other parts of Tennessee (financially and mentally, I could have used more guidance!), so I’m excited about it.
I’m going to Nashville for the ISACA GRC Conference and luckily, at the same week, there is the RSA Archer Summit. They are only a couple of blocks away from each other and I have a good feeling that Nashville is beautiful too.
I do enjoy going to conferences and being exposed to new takes on using similar solutions, the “cool” hacking presentation that someone will often do for the neato bit. Networking is nice too. I hope to get a lot of useful information from these. CPE points are nice too!
Net neutrality is the principle that Internet service providers must treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of communication. For instance, under these principles, internet service providers are unable to intentionally block, slow down or charge money for specific websites and online content.
Without the Net Neutrality rules, companies like AT&T, Comcast, and Verizon will be able to decide which websites, content and applications succeed.
Next time you get sent a scam email FORWARD it [email protected], created by Netsafe as a sophisticated A.I. email program to keep bad guys busy.
The A.I. will reply to the bad guys with conversation and keep them busy until they realize that they aren’t going anywhere. When the conversation is over, re:scam will email you a copy of the chain so you can get a good laugh at the exchange the A.I. and the bad guys had. This is security awareness!
The video is kind of creepy, but fun at the same time.
I was having some connectivity issues at the hotel I was staying at recently, while I was checking out how many likes I got on my photos in my post on Facebook. Some pictures weren’t loading and I was shocked… (maybe not that shocked) to see that the tech behind the uploader analyzes the photos and writes the metadata descriptions of what the photo is or maybe about.
Learn about potential extreme hackerness from an extreme, fictional story.
The hacker uses social engineering tactics and hacks into many things in Pierce Brosnan’s character, Mike Regan’s life and tries to ruin every aspect of his life. It’s a crazy movie and you can watch it on Amazon here.
I haven’t been doing a lot of posting this year, as my involvement at work on keeping many folks abreast on industry news has been waning. I have been focusing a lot more on several other areas within the Governance, Risk, and Compliance space, including building our processes to be used for our Archer platform and keeping those developers on track. A lot of what I’ve been up to, can’t really be shared, but what I can say is that I’ll be going to RSA charge next month. I am looking forward to it. If you are going, let me know!