Frank McGovern attends many events and enjoys live-posting discussions or presentations to share knowledge. Here is a list of these posts.
Microsoft Ignite, 2024
“Break down risk siloes and build up code to runtime security posture”
“Making Zero Trust Real: Top 10 Security Controls you can implement now”
“Accelerate your Zero Trust Journey: Unify Identity and Network Access”
“Cloud platform security in an evolving threat landscape”
“What’s New in Windows Security, Productivity and Cloud”
“Security Innovation to Strengthen Cyber Defense in the Age of AI”
“Outages are inevitable and here’s what you should know”
“The Power of Diversity – Building a stronger cybersecurity workforce in the era of AI.”
Shmoocon, 2024
Unlocking Enterprise-scale Security Visibility by Eknath Venkataramani (@eknath) and Frank Olbricht at @shmoocon.
— Frank McGovern – INACTIVE (@FrankMcG) January 14, 2024
Use cases: TI, Compliance (Evidence), and Vuln Mgmt (SBOM)
Reqs: Efficient, Reliable, Scalable, Integration, Data accessed and analyzed natively
CISO Risk Dumpster Fires: SEC Turns Up the Heat by Liz Wharton (@LawyerLiz), Danette
— Frank McGovern – INACTIVE (@FrankMcG) January 14, 2024
Edwards, and Cyndi Gula (@cyndi_gula) at @shmoocon.
As always, “put nothing in writing that you don’t want to see in a disposition.”
🧵
You Wouldn't Scrape the Internet to Make an LLM: Law and Policy of Scraping th Kurt Opsahl (@kurtopsahl) at @shmoocon.
— Frank McGovern – INACTIVE (@FrankMcG) January 13, 2024
What’s at stake? Innovation, Privacy, and Cybersecurity.
Lean, Developer-Friendly Threat Modeling by Falcon Darkstar Momot at @shmoocon.
— Frank McGovern – INACTIVE (@FrankMcG) January 13, 2024
What’s Threat modeling?
Simply: Figure out what your threats are. We do it to identify necessary controls.https://t.co/VRMfw4t9Wr
Intel is a Fallacy, But I May Be Biased by Andy Piazza (@klrgrz) at @shmoocon.
— Frank McGovern – INACTIVE (@FrankMcG) January 13, 2024
Most companies aren’t using Intel properly. Most people aren’t reading the reports.
Most aren’t using it properly.
“Words matter.” Title has irony in it. pic.twitter.com/RFVCaka5ax
Microsoft Ignite, 2022
Windows: Building what matters most for your business” by Panos Panay
— Frank McGovern – INACTIVE (@FrankMcG) October 13, 2022
(@panos_panay), Steven Bathiche (@sbathiche), Joe Belfiore (@joebelfiore), Ramya Chitrakar (@ramyachitrakar),
Scott Manchester (@RDS4U), David "dwizzzzle" Weston (@dwizzzleMSFT), and Lan Ye at @MS_Ignite pic.twitter.com/lTQjtrBJjj
Inside Azure Innovations with Mark Russinovich” by Mark Russinovich
— Frank McGovern – INACTIVE (@FrankMcG) October 13, 2022
(@markrussinovich) at @MS_Ignite pic.twitter.com/5OswvvWQXR
“How to successfully implement accessibility in your
— Frank McGovern – INACTIVE (@FrankMcG) October 13, 2022
organization (whether you think you need it or not!)” by Eddie Leonard (@DJ_EddieL) and Dona Sarkar
(@donasarkar) at @MS_Ignite pic.twitter.com/VaXB8E85a6
“Deep dive into managing and monitoring your Azure networks” by Kevin
— Frank McGovern – INACTIVE (@FrankMcG) October 13, 2022
Fleming and Pierre Roman (@wiredcanuck) at @MS_Ignite. pic.twitter.com/itfPkL19Gx
“Governance & Security Practices for Microsoft 365, including Microsoft
— Frank McGovern – INACTIVE (@FrankMcG) October 13, 2022
Teams, Viva and Loop guidance” by Karuana Gatimu (@Karuana) and John Gruszcyk at @MS_Ignite pic.twitter.com/3xorvGbRde
“Stories from DART: Taking the ware out of ransomware” by Stella
— Frank McGovern – INACTIVE (@FrankMcG) October 12, 2022
Aghakian and Kate Livingston at @MS_Ignite. pic.twitter.com/Nfqo6NcK70
“Protect everything, everyone, everywhere with comprehensive
— Frank McGovern – INACTIVE (@FrankMcG) October 12, 2022
security” by Joy Chik (@joychik), Rob Lefferts (@Rob_Lefferts), Rudra Mitra (@RudraMitra), Shawn Bice
(@shawnbice), Vasu Jakkal (@vasujakkal), and Steve Dispensa (@dispensa) at @MS_Ignite. pic.twitter.com/KClV47bSz5
“How Customers Build Agility and Drive Innovation with the Microsoft Cloud” by
— Frank McGovern – INACTIVE (@FrankMcG) October 12, 2022
Scott Guthrie (@scottgu) and Alysa Taylor (@AlysaTaylorMSFT) at @MS_Ignite. pic.twitter.com/q8tzYoX51b
“Microsoft Ignite Opening” by Satya Nadella (@satyanadella) at @MS_Ignite. pic.twitter.com/e9V8QmjnLq
— Frank McGovern – INACTIVE (@FrankMcG) October 12, 2022
Misc 2020
Sitting at a chapter event with @ISACAChicago today discussing the FAIR framework: a quantitative way to do risk management.
— Frank McGovern – INACTIVE (@FrankMcG) February 20, 2020
Gonna live tweet some stuff.
At an @isaca_chicago talk titled “Predictions for GRC: How Security Relates to Risk Management”
— Frank McGovern – INACTIVE (@FrankMcG) January 16, 2020
Thread.
Misc 2019
At a discussion today on cyber litigation and what you can do to reduce your cyber legal risks. pic.twitter.com/5eYh8MWOYt
— Frank McGovern – INACTIVE (@FrankMcG) August 15, 2019
DerbyCon, 2019
Early Detection Through Deception by Jason Nester (@snorkel42)@DerbyCon #DerbyCon. pic.twitter.com/VDhnZYCPKY
— Frank McGovern – INACTIVE (@FrankMcG) September 7, 2019
Azure Sentinel – A First Look at Microsoft’s SIEM Solution by Carl Hertz (@cillic) @DerbyCon #derbycon pic.twitter.com/7yoguZt3uE
— Frank McGovern – INACTIVE (@FrankMcG) September 6, 2019
One Woman's Journey to CISO Leveraging Social Engineering by Kate Mullin (@kate944032) @DerbyCon #DerbyCon. pic.twitter.com/4iqFFsirEn
— Frank McGovern – INACTIVE (@FrankMcG) September 7, 2019
Empathy as a Service to Create a Culture of Security by Tracy Maleeff (@InfoSecSherpa) at @DerbyCon #DerbyCon. pic.twitter.com/meZwDpGeDl
— Frank McGovern – INACTIVE (@FrankMcG) September 8, 2019
Five Mistakes We Wish Users Would Stop Making by Lesley Carhart (@hacks4pancakes), Chelle Clements, April Wright (@aprilwright), Amanda Berlin (@infosystir), and Lee Neely @DerbyCon #DerbyCon. pic.twitter.com/6MIip11O7S
— Frank McGovern – INACTIVE (@FrankMcG) September 7, 2019
IPv6 Security Considerations – For When "Just Turn It Off" Isn't Good Enough by Jason Lewis @DerbyCon #derbycon pic.twitter.com/k5pINT8V2x
— Frank McGovern – INACTIVE (@FrankMcG) September 6, 2019
The “Art” of The BEC – What Three Years of Fighting Has Taught Us by Ronnie Tokazowski (@iHeartMalware) @DerbyCon #DerbyCon. pic.twitter.com/m9X1xNpqEr
— Frank McGovern – INACTIVE (@FrankMcG) September 7, 2019
Attacking with Automation: How Office 365 automation provides another new risk to the cloud by Trent Lo (@surbo) @DerbyCon #DerbyCon. pic.twitter.com/NmGwRcfdBI
— Frank McGovern – INACTIVE (@FrankMcG) September 7, 2019
Getting the most out of your covert physical security assessment – A Client’s Guide by Brent White (@brentwdesign) and Tim Roberts (@zanshinh4x) @DerbyCon #derbycon pic.twitter.com/XI0IqTd8Sy
— Frank McGovern – INACTIVE (@FrankMcG) September 6, 2019
How to Tell the C-Level Their Baby is Ugly by Heather Smith (@LitMoose) @DerbyCon #DerbyCon. pic.twitter.com/sc4LDrruhS
— Frank McGovern – INACTIVE (@FrankMcG) September 6, 2019
Adventures in Azure Privilege Escalation by Karl Fosaaen (@kfosaaen) @DerbyCon #DerbyCon. pic.twitter.com/fH6bVKAFqq
— Frank McGovern – INACTIVE (@FrankMcG) September 7, 2019
DEF CON, 2019
Security Strategy for Small-Medium Business Panel by Claus Cramon Houmann (@ClausHoumann), Amanda Berlin (@infosystir), Jim Nitterauer (@jnitterauer), (@litmoose) and Russell (@sm0kem) @defcon @BlueTeamVillage#DEFCON #HackerSummerCamp pic.twitter.com/9HP8y1zLFj
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2019
Anatomy of a Megabreach: Equifax Report by Dumby (@uncl3dumby) @defcon @BlueTeamVillage #defcon #HackerSummerCamp pic.twitter.com/J49xsdXbDd
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2019
Why You Should Fear Your “mundane” Office Equipment by Daniel Romero (@daniel_rome) and Mario Rivas (@Grifo) @defcon #DEFCON #HackerSummerCamp. pic.twitter.com/MGuTyC59mA
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2019
When a Plan Comes Together: Building a SOC A-Team by Mark Orlando
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2019
(@markaorlando) @defcon @BlueTeamVillage.#DEFCON #HackerSummerCamp pic.twitter.com/Ozvqcs7N21
Circle City Con, 2019
Get off my lawn… or are we looking for the right people? By Mike Kavka “Shecky” (@siliconshecky) @CircleCityCon #CircleCityCon pic.twitter.com/CgUT9GII6p
— Frank McGovern – INACTIVE (@FrankMcG) June 1, 2019
Cons & Careers by Steven Bernstein (@SciaticNerd) @CircleCityCon #CircleCityCon pic.twitter.com/AiyDUsn0i8
— Frank McGovern – INACTIVE (@FrankMcG) May 31, 2019
Star Wars: How an ineffective Data Governance Program destroyed the Galactic Empire by Micah Brown (@micahkbrown) @CircleCityCon #CircleCityCon. pic.twitter.com/QipQfu6CKD
— Frank McGovern – INACTIVE (@FrankMcG) May 31, 2019
Data Access Rights Exploits under New Privacy Laws by Amber Welch (@MsAmberWelch) pic.twitter.com/XxXTQ7PN7K
— Frank McGovern – INACTIVE (@FrankMcG) May 31, 2019
Training and Education for the New Realities of Privacy and Security by Mitchell Parker by @CircleCityCon #CircleCityCon pic.twitter.com/3Lm2Oi84AA
— Frank McGovern – INACTIVE (@FrankMcG) June 1, 2019
Evicting the Password from the Digital Estate by Alex Chalmers (@alexbchalmers) @CircleCityCon #CircleCityCon pic.twitter.com/QX9OMTaNzR
— Frank McGovern – INACTIVE (@FrankMcG) June 1, 2019
InfoSuck: The Nasty Bits Of The Industry We Want To Tell Noobs But Aren't Allowed To In Polite Company by Danny Akacki (@rand0h) @CircleCityCon #CircleCityCon pic.twitter.com/n29FYfaFrL
— Frank McGovern – INACTIVE (@FrankMcG) June 1, 2019
DerbyCon, 2018
Panel Discussion – At a Glance: Information Security by Ed Skoudis (@edskoudis of @inguardians), John Strand (@strandjs of @BHinfoSecurity), Lesley Carhart (@hacks4pancakes of @dragosinc), and Dave Kennedy (@HackingDave of @TrustedSec) @derbycon #DerbyCon. pic.twitter.com/4w8EbdPkAQ
— Frank McGovern – INACTIVE (@FrankMcG) October 5, 2018
Media hacks: an Infosec guide to dealing with journalists by Sean Gallagher (@thepacketrat of @ArsTechnica), Steve Ragan (@SteveD3 of @CSOonline), Paul Wagenseil (@snd_wagenseil of @tomsguide) @derbycon #derbycon. pic.twitter.com/Ye0Nc7AZqt
— Frank McGovern – INACTIVE (@FrankMcG) October 6, 2018
The Unintended Risks of Trusting Active Directory by Lee Christensen (@tifkin_ of @SpecterOps), Will Schroeder (@harmj0y of @SpecterOps), and Matt Nelson (@enigma0x3 of @SpecterOps) @DerbyCon #derbycon. pic.twitter.com/XcekX6izzZ
— Frank McGovern – INACTIVE (@FrankMcG) October 5, 2018
How to put on a Con for Fun and (Non) Profit by Benny Karnes (@kungfujo), John Moore (@mournewind), Rick Hayes (@ragingotaku), Matt Perry (@sirgurdWV), Bill Gardner (@oncee), Justin Rogosky (@CptSexy), Mike Fry (@MichaelDFry), Steve Truax (@steventruax) @derbycon #derbycon. pic.twitter.com/e2BUQRLIoO
— Frank McGovern – INACTIVE (@FrankMcG) October 6, 2018
Draw a Bigger Circle: InfoSec Evolves by Cheryl Biswas (@3ncr1pt3d of @TD_Canada) @derbycon #derbycon. pic.twitter.com/NjynfrXxhY
— Frank McGovern – INACTIVE (@FrankMcG) October 5, 2018
Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community by Kathleen Smith (@YesItsKathleen), Magen Wu (@tottenkoph), Cindy Jones (@SinderzNAshes), Kathryn Seymour, Kirsten Renner @derbycon #derbycon. pic.twitter.com/XvmJY2KZTY
— Frank McGovern – INACTIVE (@FrankMcG) October 6, 2018
The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs by Arian Evans (@arianevans) @derbycon #derbycon. pic.twitter.com/asz0XTKTkY
— Frank McGovern – INACTIVE (@FrankMcG) October 6, 2018
Getting Control of Your Vendors Before They Take You Down by Dan Browder (@nevon) @derbycon #derbycon pic.twitter.com/PTisEacmj3
— Frank McGovern – INACTIVE (@FrankMcG) October 7, 2018
Deploying Deceptive Systems: Luring Attackers from the Shadows by Kevin Gennuso (@kevvyg of @DICKS) @derbycon #derbycon pic.twitter.com/HakwKtK14m
— Frank McGovern – INACTIVE (@FrankMcG) October 6, 2018
How to Influence Security Technology in Kiwi Underpants by Benjamin Delpy (@gentilkiwi) @derbycon #derbycon. pic.twitter.com/bLdl26gRDv
— Frank McGovern – INACTIVE (@FrankMcG) October 5, 2018
Changing Our Mindset From Technical To Psychological Defenses by Andrew Kalat (@Lerg) @derbycon #derbycon pic.twitter.com/WBDYNYYBEx
— Frank McGovern – INACTIVE (@FrankMcG) October 7, 2018
DEF CON, 2018
One-Click to OWA by William Martin (@quickbreach).@defcon #defcon #HackerSummerCamp pic.twitter.com/ZWzzGj03JQ
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2018
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used in the Criminal Justice System by Dr. Jeanna N. Matthews (@jeanna_matthews), Nathan Adams, and Jerome Greco (@JeromeDGreco).@defcon #defcon #HackerSummerCamp pic.twitter.com/AUeWF22nQQ
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
NSA Talks Cybersecurity by Rob Joyce (@RGB_Lights).@defcon #defcon #HackerSummerCamp pic.twitter.com/IOjEFLbuHp
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2018
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 by Gabriel Ryan (@s0lst1c3).@defcon #defcon #HackerSummerCamp pic.twitter.com/v9nT7xmX4r
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2018
Who Controls the Controllers—Hacking Crestron IoT Automation Systems by Ricky Lawshae (@HeadlessZeke).@defcon #defcon #HackerSummerCamp pic.twitter.com/wu7n9Nk8tT
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2018
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones by Eduardo Izycki (@Dudarthur) and Rodrigo Colli (@Rodrigo_Colli).@defcon #defcon #HackerSummerCamp pic.twitter.com/wtBGg6vFDV
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
Inside the Fake Science Factory by Svea Eckert (@sveckert), Chris Sumner (@5uggy), and Till Krause (@tillkrause).@defcon #defcon #HackerSummerCamp pic.twitter.com/wJnlmvUxpp
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
Exploiting Active Directory Administrator Insecurities by Sean Metcalf (@PyroTek3).@defcon #defcon #HackerSummerCamp pic.twitter.com/BHPKsUcNfQ
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills by Daniel Zolnikov (@DanielZolnikov).@defcon #defcon #HackerSummerCamp pic.twitter.com/kZA9XAMBfw
— Frank McGovern – INACTIVE (@FrankMcG) August 12, 2018
Your Voice is my Passport by John Seymour (@_delta_zero) and Azeem Aqil.@defcon #defcon #HackerSummerCamp pic.twitter.com/Iol8ljwV9F
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2018
Lost and Found Certificates: dealing with residual certificates for pre-owned domains by Ian Foster (@ianfoster) and Dylan Ayrey.@defcon #defcon #HackerSummerCamp pic.twitter.com/hLsoG5osZa
— Frank McGovern – INACTIVE (@FrankMcG) August 12, 2018
Ridealong Adventures—Critical Issues with Police Body Cameras by Josh Mitchell (@bx_lr).@defcon #defcon #HackerSummerCamp pic.twitter.com/GsaeGKD1ew
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
The Road to Resilience: How Real Hacking Redeems this Damnable Profession by Richard Thieme (@neuralcowboy).@defcon #defcon #HackerSummerCamp pic.twitter.com/Bz9nyDnap0
— Frank McGovern – INACTIVE (@FrankMcG) August 12, 2018
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask) by @elinormills, @joegrand, @spacerog, @dotmudge, @weldpond, and more.@defcon #defcon #HackerSummerCamp pic.twitter.com/0bckjgze7B
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
Reverse Engineering Windows Defender's Emulator by Alexei Bulazel (@0xAlexei).@defcon #Defcon #HackerSummerCamp pic.twitter.com/OHxRleb2Sv
— Frank McGovern – INACTIVE (@FrankMcG) August 11, 2018
Black Hat USA, 2018
From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it by Sean Metcalf (@PyroTek3).@BlackHatEvents #BlackHat #BlackHatUSA #Blackhat18 #HackerSummerCamp pic.twitter.com/2SZwqEfAU0
— Frank McGovern – INACTIVE (@FrankMcG) August 8, 2018
Is the Mafia Taking Over Cybercrime? By Jonathan Lusthaus of @UniofOxford.@BlackHatEvents #BlackHat #Blackhat2018 #blackhat18 #HackerSummerCamp pic.twitter.com/rWoPe7ZcVy
— Frank McGovern – INACTIVE (@FrankMcG) August 9, 2018
Dissecting Non-Malicious Artifacts: One IP at a Time by Dani Goland (@DaniGoland of @VirusBay) and Ido Naor (@IdoNaor1 of @Kaspersky).@BlackHatEvents #Blackhat #Blackhat18 #BlackHat2018 #BlackHatUSA pic.twitter.com/0AQvVInR6U
— Frank McGovern – INACTIVE (@FrankMcG) August 8, 2018
Lessons and Lulz: The 4th Annual Black Hat USA NOC Report by Bart Stump (@theStump3r of @goredsky) and Neil Wyler (@grifter801 of @RSAsecurity).@BlackHatEvents #blackhat #BlackHatUSA #BlackHat18 #HackerSummerCamp pic.twitter.com/FjRiFoUHa4
— Frank McGovern – INACTIVE (@FrankMcG) August 10, 2018
AI & ML in Cyber Security – Why Algorithms are Dangerous by Raffael Marty (@raffaelmarty of @pixlcloud and @Forcepointsec).@BlackHatEvents #BlackHatUSA #blackhat #Blackhat18 #HackerSummerCamp pic.twitter.com/qdKkc3lhuW
— Frank McGovern – INACTIVE (@FrankMcG) August 9, 2018
Identity Theft: Attacks on SSO Systems by Kelby Ludwig (@kelbyludwig of @duosec).@BlackHatEvents #blackhat #Blackhat18 #blackhatusa #HackerSummerCamp pic.twitter.com/lxyh4ph7L0
— Frank McGovern – INACTIVE (@FrankMcG) August 9, 2018
Legal Landmines: How Law and Policy are Rapidly Shaping Information Security by Allison Bender (@AllisonJBender of @ZwillGen), Amit Elazari (@amitelazari of @UCBerkeley), Jennifer Granick (@granick of @ACLU), Joseph Mann (@josephmenn of @thomsonreuters), (1/2) pic.twitter.com/6JA2k03GRt
— Frank McGovern – INACTIVE (@FrankMcG) August 8, 2018
ZEROing Trust: Do Zero Trust Approaches Deliver Real Security? By David Weston (@dwizzzleMSFT of @Microsoft).@BlackHatEvents #blackhat #BlackHat18 #BlackHatUSA #HackerSummerCamp pic.twitter.com/nkUkBxSiCg
— Frank McGovern – INACTIVE (@FrankMcG) August 8, 2018
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key by Gianpaolo Russo of @MITREcorp, L Jean Camp of @IUBloomington, and Sanchari Das (@sancharidecrypt of @IUBloomington).@BlackHatEvents #Blackhat18 #blackhat #BlackHatUSA pic.twitter.com/gPy9IcSCWn
— Frank McGovern – INACTIVE (@FrankMcG) August 9, 2018
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek (@JosephBialek of @Microsoft) and Nicolas Joly (@n_joly of @Microsoft).@BlackHatEvents #Blackhat #Blackhat18 #BlackHat2018 #BlackHatUSA #HackerSummerCamp pic.twitter.com/5nPCqhSXGH
— Frank McGovern – INACTIVE (@FrankMcG) August 8, 2018
How can Someone with Autism Specifically Enhance the Cyber Security Workforce? by Casey Hurt (@hurt_casey of @DeptofDefense), Dr. Stacy Thayer, and Rhett Greenhagen of @mcafee.@BlackHatEvents #blackhat #BlackHatUSA #blackhat2018 #HackerSummerCamp pic.twitter.com/QWAhfogPNp
— Frank McGovern – INACTIVE (@FrankMcG) August 9, 2018
Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes by Parisa Tabriz (@laparisa of @google).@BlackHatEvents #Blackhat18 #BlackHat #BlackHat2018 pic.twitter.com/8jbYH8Tw4D
— Frank McGovern – INACTIVE (@FrankMcG) August 8, 2018