5

USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers

 2 years ago
source link: https://www.youtube.com/watch?v=bDJb8WOJYdA
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
0:00 / 34:55

USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers

150,980 views
Jan 28, 2016

Rob Joyce, Chief, Tailored Access Operations, National Security Agency

From his role as the Chief of NSA's Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.

A transcript of this talk is available: https://www.usenix.org/conference/eni...

Sign up to find out more about Enigma conferences: https://www.usenix.org/conference/eni...

Watch all Enigma 2016 videos at: http://enigma.usenix.org/youtube

Show lessShow more

58 Comments

Sort by
default-user=s48-c-k-c0x00ffffff-no-rj
Add a public comment...
Whoever convinced the head of TAO at Ft. Meade to give a conference presentation on thwarting nation-state attacks is the person I want handling booking if I ever hold a conference on anything. Damn. One very slight ding: from a news report re. this talk (that actually led me to look for this clip in the first place) it appears that there was a bit of Q & A after the end of the presentation that isn't shown here. Still, thanks very much for uploading this, as well as other presentations from the conference.

Read more 5 years ago

Just finished watching.  A great presentation covering a host of topics everyone responsible for IT security should consider.If you want a technical "how to" manual this is not the presentation for you.  If you're not a techie and especially if you are actually vested with security responsibility and authority beyond clacking on a keyboard, this is a must see for you.

Read more 5 years ago

The process and remediations the guy presents are nothing new, any good pen testing outfit will be doing the same, difference is the NSA have virtually unbounded resources to do it. That said, still an interesting talk, shame about the q & a

5 years ago

Thanks for posting this talk and content from the conference.

5 years ago

Know Thyself: it is an olympic ideal to either become or sustain competitive greatness. This use of Know Thyself for InfoSec Defense is spot on. The model of three attackers: opportunist, advanced persistent and destructive is excellent also. From this talk alone, a world class InfoSec program could be built.

4 years ago


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK