From Security Weekly Wiki
Jump to navigationJump to search
1,584 bytes added ,  18:58, 10 October 2013
Thierry has 14 years experience in information security, designing resistant architectures and systems, managing development and information security teams, ISM policies and high profile penetration tests. Thierry has a security blog over at [ ] . Thierry is currently now working as a Practice Lead for Threat and Vulnerability Management at Verizon Business.
# How did you get your start in information security?
# What advice do you have for others getting their start in information security?
# What is your vulnerability disclosure policy and what led to you adopting this particular policy?
# What is the coolest security vulnerability/bug you've ever found?
# Do you believe its important to make the distinction between a bug and a flaw?
# What can we do to improve software security?
# Should people run A/V software or is it a complete waste of time?
# Are folks underestimating the continued threat of Bluetooth attacks or have we got that all figured out? Or, more likely, now that every smartphone has Wifi and 3g, a web browser and apps, its far easier to attack them via these methods?
# Will we ever be able to trust SSL? Tell us a little about SSL audit tool you wrote and some of the features such as fingerprinting…
# is privacy dead, did we kill it, has the US Government taken it hostage, or all of the above?
# Who are the primary threats and how well coordinated do you find them to be?
# How well should we know our enemy?
# From a defensive perspective, what is the most innovative and/or effective technology to surface recently?
# Three words to describe yourself
# If you were a serial killer, what would be your weapon of choice?
# If you wrote a book about yourself, what would the title be?
# In the popular game of Ass Grabby Grabby do you prefer to go first or second?
# Stranded in a desert island, which tablet would you bring along: a) iPad b) Surface c) Android d) All of the above e) None of the above?
= Heather Mahalik from SANS on Advanced Smartphone and Mobile Device Forensics Course =


Navigation menu