home.social

#futureconseattle — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #futureconseattle, aggregated by home.social.

  1. 🚨 You Had One Job — FutureCon Seattle 2025 🔐

    In 2024, attackers didn’t need phishing emails. They waited for the next zero-day in your firewall. As Mandiant’s M-Trends 2025 shows, edge device exploits are now the top intrusion vector — and security vendors themselves are becoming the new initial access brokers (unintentionally, of course).

    My talk at #FutureConSeattle was a no-BS reality check: 10 ways orgs are still failing at foundational security, and how to fix it — no buzzwords, no user-blaming, no new vendor required.

    🛠️ Just configure what you already own, document it, and follow through. Because no one wants to explain how your security box got you owned.

    📊 Slides here: slideshare.net/slideshow/futur
    #CyberSecurity #Infosec #NIST #PCI #FutureCon #MTrends2025

  2. 🚨 You Had One Job — FutureCon Seattle 2025 🔐

    In 2024, attackers didn’t need phishing emails. They waited for the next zero-day in your firewall. As Mandiant’s M-Trends 2025 shows, edge device exploits are now the top intrusion vector — and security vendors themselves are becoming the new initial access brokers (unintentionally, of course).

    My talk at #FutureConSeattle was a no-BS reality check: 10 ways orgs are still failing at foundational security, and how to fix it — no buzzwords, no user-blaming, no new vendor required.

    🛠️ Just configure what you already own, document it, and follow through. Because no one wants to explain how your security box got you owned.

    📊 Slides here: slideshare.net/slideshow/futur
    #CyberSecurity #Infosec #NIST #PCI #FutureCon #MTrends2025

  3. 🚨 You Had One Job — FutureCon Seattle 2025 🔐

    In 2024, attackers didn’t need phishing emails. They waited for the next zero-day in your firewall. As Mandiant’s M-Trends 2025 shows, edge device exploits are now the top intrusion vector — and security vendors themselves are becoming the new initial access brokers (unintentionally, of course).

    My talk at was a no-BS reality check: 10 ways orgs are still failing at foundational security, and how to fix it — no buzzwords, no user-blaming, no new vendor required.

    🛠️ Just configure what you already own, document it, and follow through. Because no one wants to explain how your security box got you owned.

    📊 Slides here: slideshare.net/slideshow/futur