Difference between revisions of "Frank Angiolelli"

From Socology.org - The Study of Security Operations
Jump to: navigation, search
(Created page with "Frank Angiolelli, CISSP, GSLC, ITILv3 is a veteran Security practitioner with lengthy experience in Security Operations and Leading Enterprise Incident Response. ==Author of...")
 
Line 2: Line 2:
  
 
==Author of==
 
==Author of==
[https://www.socology.org/wiki/Documents/Criminal_Online_Sociometry.pdf Pioneering Criminal Online Sociometry]
+
*[https://www.socology.org/wiki/Documents/Criminal_Online_Sociometry.pdf Pioneering Criminal Online Sociometry]
[https://www.socology.org/wiki/Documents/Dimensions_of_Evolving_and_Managing_Security_Operations.pdf Dimensions of Evolving and Managing Security Operations, Oct 2018]
+
*[https://www.socology.org/wiki/Documents/Dimensions_of_Evolving_and_Managing_Security_Operations.pdf Dimensions of Evolving and Managing Security Operations, Oct 2018]
[http://securityaffairs.co/Downloads/Cybercriminals_Leveraging_Facebook-3.doc Cyber Criminals Leveraging Facebook]
+
*[http://securityaffairs.co/Downloads/Cybercriminals_Leveraging_Facebook-3.doc Cyber Criminals Leveraging Facebook]
  
 
==Judo Threat Intelligence Philosophy==
 
==Judo Threat Intelligence Philosophy==
 
[https://www.sans.org/summit-archives/file/summit-archive-1493839943.pdf Judo Threat Intelligence Presentation]
 
[https://www.sans.org/summit-archives/file/summit-archive-1493839943.pdf Judo Threat Intelligence Presentation]
1. Use the attackers energy against them
+
*Use the attackers energy against them
2. Maximum effect, minimum effort
+
*Maximum effect, minimum effort
3. Break their posture, execute the throw
+
*Break their posture, execute the throw
  
 
CISSP #354776 (18 Nov 2009)
 
CISSP #354776 (18 Nov 2009)

Revision as of 07:30, 17 October 2018

Frank Angiolelli, CISSP, GSLC, ITILv3 is a veteran Security practitioner with lengthy experience in Security Operations and Leading Enterprise Incident Response.

Author of

Judo Threat Intelligence Philosophy

Judo Threat Intelligence Presentation

  • Use the attackers energy against them
  • Maximum effect, minimum effort
  • Break their posture, execute the throw

CISSP #354776 (18 Nov 2009)