Dungeon Master: You are standing in a brilliant lit server roomed filled with millions of dollars in sunk legacy server costs. You: Roll the dice and advance. Dungeon Master: A DevOps ghoul jumps out from behind an IBM 360 running…
Author: Samuel Liles
Road to somewhere
This gallery contains 1 photo →
Bay Boat
This gallery contains 1 photo →
City on the bay
This gallery contains 1 photo →
Covered Bridge
Research note: Security testing through forensic resistance
Senate Intelligence Committee hearing on Russia election interference
Presentations, posts, categories
Presentations (PDF) Teaching Presentation Research Presentation Blog Posts Considerations of defense in depth Attribution of cyber adversaries Research Note: Defining attacker knowledge, skill, and ability Blog Categories Digital Forensics Incident Response Threat Intelligence Student Work
Today’s Attack IPs
For those that are interested. The following list of IP addresses were attempting to brute force log in against the Selil blog. If you own the addresses below. Before you contact me. Make sure your stuff is clean. Anybody out…
Government transition: Planning ahead for career risk
As a FED covered by the Hatch Act most onerous elements I have eschewed all political discourse and basically kept my mouth shut. That isn’t going to change now. I have no view public or private to share on the…
CISO metrics: Right sizing and right costing an information security program
In the continuing attempt to prove to the wider world I’m a desirable hire as a CISO for a fortune 100 company. I offer the following and hope even if you don’t hire me that you get something of use…
Motorcycling Commuting: Today the van suspension missile
Over the years I have had to go around, over, or through some interesting items as I get from point a to point b on my motorcycles. I’ve dealt with ladders, opossums, tires, hail, parts and complete carcasses of animals,…
CISO Hunting Tags: What threat hunting should mean to you
If you don’t have a successful information security program don’t waste your dollars or time on threat hunting until you can secure what you own first. There has been much ink spilled on threat hunting in the network. Even the…
New CISO? Get your first 90 days action items here
So you’re a new CISO and you just arrived at the organization. What should your personal interaction project plan look like? I tell CISO’s that they should plan on a few days to simply spin up their technology, get their…
You’re not in our industry WTF do you know about infosec?
This is more from my noisy search for my next windmill to tilt at in what will be the great success of helping an organization become more resilient, capable, and respected for the information security posture they exhibit. I like…