Left of Boom

Cloud, Mobile & IAM Theatre

Wed 17th Oct 02:20 to 02:50

The term “Left of Boom” was made popular in 2007 in reference to the U.S. military combating improvised explosive devices (IEDs) used by insurgents in Afghanistan and Iraq. The U.S. military spent billions of dollars developing technology and tactics to prevent and detect IEDs before detonation, with a goal of disrupting the bomb chain. This is an analog to cybersecurity as we strive to increase the incident prevention capabilities of our security tools and where we can’t prevent attacks, augment prevention with incident detection and response tools. This presentation is all about getting cybersecurity evidence to know, empirically, what’s working, what’s not, how to fix it, how to keep it working, and most importantly, stay left of boom.

What you will take away from this session

  • Leveraging automated methods to validate and improve your security tools
  • Taking advantage of configuration assurance to make sure what you did does what you want
  • Improving your security teams and processes
  • Developing metrics for communicating security effectiveness to executives


Photo Speaker Name Profile
Brian Contos Brian Contos View Profile