Why Data breaches happen and What can we do about it

Hygiene is hard but limits lasting damage

A common joke in information security is that there are only two companies in the world - Ones who were already hacked and ones who did not know about it. Data breaches are hence the outward symptom exhibited by companies that were already hacked and hence represent just a tip of the iceberg. The breaches however are interesting because like a crime scene filled with evidence, offer all of us clues on the common patterns on offensive measures that are deployed by both the hackers and the defensive measures deployed by the defenders, and why the defenders failed. The lessons learnt hence are reusable by both parties in pushing the trade craft of information security further.

To this end, we are looking for submissions that broadly fall into the story line below:

  1. Real world stories on Data breaches and the impact of the breach on the Victims.
  2. Defensive measures deployed by the defenders and why they failed.
  3. Offensive measures deployed by the attackers and why they succeeded.

Selected submissions would be then converted into either recorded talks of a duration of 15, 30 or 40 minutes or into written articles of < 1000 words and would be premiered on the last Friday of every month and the First premiere would be on 26th February, 2021.

Hosted by

Rootconf is a community-funded platform for activities and discussions on the following topics: Site Reliability Engineering (SRE). Infrastructure costs, including Cloud Costs - and optimization. Security - including Cloud Security. more

A common joke in information security is that there are only two companies in the world - Ones who were already hacked and ones who did not know about it. Data breaches are hence the outward symptom exhibited by companies that were already hacked and hence represent just a tip of the iceberg. The breaches however are interesting because like a crime scene filled with evidence, offer all of us clues on the common patterns on offensive measures that are deployed by both the hackers and the defensive measures deployed by the defenders, and why the defenders failed. The lessons learnt hence are reusable by both parties in pushing the trade craft of information security further.

To this end, we are looking for submissions that broadly fall into the story line below:

  1. Real world stories on Data breaches and the impact of the breach on the Victims.
  2. Defensive measures deployed by the defenders and why they failed.
  3. Offensive measures deployed by the attackers and why they succeeded.

Selected submissions would be then converted into either recorded talks of a duration of 15, 30 or 40 minutes or into written articles of < 1000 words and would be premiered on the last Friday of every month and the First premiere would be on 26th February, 2021.

Hosted by

Rootconf is a community-funded platform for activities and discussions on the following topics: Site Reliability Engineering (SRE). Infrastructure costs, including Cloud Costs - and optimization. Security - including Cloud Security. more