Frank McGovern attends many events and enjoys live-tweeting discussions or presentations to share knowledge. Here is a list of these tweet stories.
Shmoocon, 2024
Unlocking Enterprise-scale Security Visibility by Eknath Venkataramani (@eknath) and Frank Olbricht at @shmoocon.
— Frank McGovern (@FrankMcG) January 14, 2024
Use cases: TI, Compliance (Evidence), and Vuln Mgmt (SBOM)
Reqs: Efficient, Reliable, Scalable, Integration, Data accessed and analyzed natively
CISO Risk Dumpster Fires: SEC Turns Up the Heat by Liz Wharton (@LawyerLiz), Danette
— Frank McGovern (@FrankMcG) January 14, 2024
Edwards, and Cyndi Gula (@cyndi_gula) at @shmoocon.
As always, “put nothing in writing that you don’t want to see in a disposition.”
????
You Wouldn't Scrape the Internet to Make an LLM: Law and Policy of Scraping th Kurt Opsahl (@kurtopsahl) at @shmoocon.
— Frank McGovern (@FrankMcG) January 13, 2024
What’s at stake? Innovation, Privacy, and Cybersecurity.
Lean, Developer-Friendly Threat Modeling by Falcon Darkstar Momot at @shmoocon.
— Frank McGovern (@FrankMcG) January 13, 2024
What’s Threat modeling?
Simply: Figure out what your threats are. We do it to identify necessary controls.https://t.co/VRMfw4t9Wr
Intel is a Fallacy, But I May Be Biased by Andy Piazza (@klrgrz) at @shmoocon.
— Frank McGovern (@FrankMcG) January 13, 2024
Most companies aren’t using Intel properly. Most people aren’t reading the reports.
Most aren’t using it properly.
“Words matter.” Title has irony in it. pic.twitter.com/RFVCaka5ax
Microsoft Ignite, 2022
Windows: Building what matters most for your business” by Panos Panay
— Frank McGovern (@FrankMcG) October 13, 2022
(@panos_panay), Steven Bathiche (@sbathiche), Joe Belfiore (@joebelfiore), Ramya Chitrakar (@ramyachitrakar),
Scott Manchester (@RDS4U), David "dwizzzzle" Weston (@dwizzzleMSFT), and Lan Ye at @MS_Ignite pic.twitter.com/lTQjtrBJjj
Inside Azure Innovations with Mark Russinovich” by Mark Russinovich
— Frank McGovern (@FrankMcG) October 13, 2022
(@markrussinovich) at @MS_Ignite pic.twitter.com/5OswvvWQXR
“How to successfully implement accessibility in your
— Frank McGovern (@FrankMcG) October 13, 2022
organization (whether you think you need it or not!)” by Eddie Leonard (@DJ_EddieL) and Dona Sarkar
(@donasarkar) at @MS_Ignite pic.twitter.com/VaXB8E85a6
“Deep dive into managing and monitoring your Azure networks” by Kevin
— Frank McGovern (@FrankMcG) October 13, 2022
Fleming and Pierre Roman (@wiredcanuck) at @MS_Ignite. pic.twitter.com/itfPkL19Gx
“Governance & Security Practices for Microsoft 365, including Microsoft
— Frank McGovern (@FrankMcG) October 13, 2022
Teams, Viva and Loop guidance” by Karuana Gatimu (@Karuana) and John Gruszcyk at @MS_Ignite pic.twitter.com/3xorvGbRde
“Stories from DART: Taking the ware out of ransomware” by Stella
— Frank McGovern (@FrankMcG) October 12, 2022
Aghakian and Kate Livingston at @MS_Ignite. pic.twitter.com/Nfqo6NcK70
“Protect everything, everyone, everywhere with comprehensive
— Frank McGovern (@FrankMcG) October 12, 2022
security” by Joy Chik (@joychik), Rob Lefferts (@Rob_Lefferts), Rudra Mitra (@RudraMitra), Shawn Bice
(@shawnbice), Vasu Jakkal (@vasujakkal), and Steve Dispensa (@dispensa) at @MS_Ignite. pic.twitter.com/KClV47bSz5
“How Customers Build Agility and Drive Innovation with the Microsoft Cloud” by
— Frank McGovern (@FrankMcG) October 12, 2022
Scott Guthrie (@scottgu) and Alysa Taylor (@AlysaTaylorMSFT) at @MS_Ignite. pic.twitter.com/q8tzYoX51b
“Microsoft Ignite Opening” by Satya Nadella (@satyanadella) at @MS_Ignite. pic.twitter.com/e9V8QmjnLq
— Frank McGovern (@FrankMcG) October 12, 2022
Misc 2020
Sitting at a chapter event with @ISACAChicago today discussing the FAIR framework: a quantitative way to do risk management.
— Frank McGovern (@FrankMcG) February 20, 2020
Gonna live tweet some stuff.
At an @isaca_chicago talk titled “Predictions for GRC: How Security Relates to Risk Management”
— Frank McGovern (@FrankMcG) January 16, 2020
Thread.
Misc 2019
At a discussion today on cyber litigation and what you can do to reduce your cyber legal risks. pic.twitter.com/5eYh8MWOYt
— Frank McGovern (@FrankMcG) August 15, 2019
DerbyCon, 2019
Early Detection Through Deception by Jason Nester (@snorkel42)@DerbyCon #DerbyCon. pic.twitter.com/VDhnZYCPKY
— Frank McGovern (@FrankMcG) September 7, 2019
Azure Sentinel – A First Look at Microsoft’s SIEM Solution by Carl Hertz (@cillic) @DerbyCon #derbycon pic.twitter.com/7yoguZt3uE
— Frank McGovern (@FrankMcG) September 6, 2019
One Woman's Journey to CISO Leveraging Social Engineering by Kate Mullin (@kate944032) @DerbyCon #DerbyCon. pic.twitter.com/4iqFFsirEn
— Frank McGovern (@FrankMcG) September 7, 2019
Empathy as a Service to Create a Culture of Security by Tracy Maleeff (@InfoSecSherpa) at @DerbyCon #DerbyCon. pic.twitter.com/meZwDpGeDl
— Frank McGovern (@FrankMcG) September 8, 2019
Five Mistakes We Wish Users Would Stop Making by Lesley Carhart (@hacks4pancakes), Chelle Clements, April Wright (@aprilwright), Amanda Berlin (@infosystir), and Lee Neely @DerbyCon #DerbyCon. pic.twitter.com/6MIip11O7S
— Frank McGovern (@FrankMcG) September 7, 2019
IPv6 Security Considerations – For When "Just Turn It Off" Isn't Good Enough by Jason Lewis @DerbyCon #derbycon pic.twitter.com/k5pINT8V2x
— Frank McGovern (@FrankMcG) September 6, 2019
The “Art” of The BEC – What Three Years of Fighting Has Taught Us by Ronnie Tokazowski (@iHeartMalware) @DerbyCon #DerbyCon. pic.twitter.com/m9X1xNpqEr
— Frank McGovern (@FrankMcG) September 7, 2019
Attacking with Automation: How Office 365 automation provides another new risk to the cloud by Trent Lo (@surbo) @DerbyCon #DerbyCon. pic.twitter.com/NmGwRcfdBI
— Frank McGovern (@FrankMcG) September 7, 2019
Getting the most out of your covert physical security assessment – A Client’s Guide by Brent White (@brentwdesign) and Tim Roberts (@zanshinh4x) @DerbyCon #derbycon pic.twitter.com/XI0IqTd8Sy
— Frank McGovern (@FrankMcG) September 6, 2019
How to Tell the C-Level Their Baby is Ugly by Heather Smith (@LitMoose) @DerbyCon #DerbyCon. pic.twitter.com/sc4LDrruhS
— Frank McGovern (@FrankMcG) September 6, 2019
Adventures in Azure Privilege Escalation by Karl Fosaaen (@kfosaaen) @DerbyCon #DerbyCon. pic.twitter.com/fH6bVKAFqq
— Frank McGovern (@FrankMcG) September 7, 2019
DEF CON, 2019
Security Strategy for Small-Medium Business Panel by Claus Cramon Houmann (@ClausHoumann), Amanda Berlin (@infosystir), Jim Nitterauer (@jnitterauer), (@litmoose) and Russell (@sm0kem) @defcon @BlueTeamVillage#DEFCON #HackerSummerCamp pic.twitter.com/9HP8y1zLFj
— Frank McGovern (@FrankMcG) August 10, 2019
Information Security in the Public Interest by Bruce Schneier (@schneierblog) @defcon #DEFCON #HackerSummerCamp pic.twitter.com/nWdBAvr3AF
— Frank McGovern (@FrankMcG) August 10, 2019
Anatomy of a Megabreach: Equifax Report by Dumby (@uncl3dumby) @defcon @BlueTeamVillage #defcon #HackerSummerCamp pic.twitter.com/J49xsdXbDd
— Frank McGovern (@FrankMcG) August 10, 2019
Why You Should Fear Your “mundane” Office Equipment by Daniel Romero (@daniel_rome) and Mario Rivas (@Grifo) @defcon #DEFCON #HackerSummerCamp. pic.twitter.com/MGuTyC59mA
— Frank McGovern (@FrankMcG) August 10, 2019
When a Plan Comes Together: Building a SOC A-Team by Mark Orlando
— Frank McGovern (@FrankMcG) August 10, 2019
(@markaorlando) @defcon @BlueTeamVillage.#DEFCON #HackerSummerCamp pic.twitter.com/Ozvqcs7N21
Circle City Con, 2019
Get off my lawn… or are we looking for the right people? By Mike Kavka “Shecky” (@siliconshecky) @CircleCityCon #CircleCityCon pic.twitter.com/CgUT9GII6p
— Frank McGovern (@FrankMcG) June 1, 2019
Cons & Careers by Steven Bernstein (@SciaticNerd) @CircleCityCon #CircleCityCon pic.twitter.com/AiyDUsn0i8
— Frank McGovern (@FrankMcG) May 31, 2019
Star Wars: How an ineffective Data Governance Program destroyed the Galactic Empire by Micah Brown (@micahkbrown) @CircleCityCon #CircleCityCon. pic.twitter.com/QipQfu6CKD
— Frank McGovern (@FrankMcG) May 31, 2019
Data Access Rights Exploits under New Privacy Laws by Amber Welch (@MsAmberWelch) pic.twitter.com/XxXTQ7PN7K
— Frank McGovern (@FrankMcG) May 31, 2019
Training and Education for the New Realities of Privacy and Security by Mitchell Parker by @CircleCityCon #CircleCityCon pic.twitter.com/3Lm2Oi84AA
— Frank McGovern (@FrankMcG) June 1, 2019
Evicting the Password from the Digital Estate by Alex Chalmers (@alexbchalmers) @CircleCityCon #CircleCityCon pic.twitter.com/QX9OMTaNzR
— Frank McGovern (@FrankMcG) June 1, 2019
InfoSuck: The Nasty Bits Of The Industry We Want To Tell Noobs But Aren't Allowed To In Polite Company by Danny Akacki (@rand0h) @CircleCityCon #CircleCityCon pic.twitter.com/n29FYfaFrL
— Frank McGovern (@FrankMcG) June 1, 2019
DerbyCon, 2018
Panel Discussion – At a Glance: Information Security by Ed Skoudis (@edskoudis of @inguardians), John Strand (@strandjs of @BHinfoSecurity), Lesley Carhart (@hacks4pancakes of @dragosinc), and Dave Kennedy (@HackingDave of @TrustedSec) @derbycon #DerbyCon. pic.twitter.com/4w8EbdPkAQ
— Frank McGovern (@FrankMcG) October 5, 2018
Media hacks: an Infosec guide to dealing with journalists by Sean Gallagher (@thepacketrat of @ArsTechnica), Steve Ragan (@SteveD3 of @CSOonline), Paul Wagenseil (@snd_wagenseil of @tomsguide) @derbycon #derbycon. pic.twitter.com/Ye0Nc7AZqt
— Frank McGovern (@FrankMcG) October 6, 2018
When Macs Come Under ATT&CK by Richie Cyrus (@rrcyrus of @SpecterOps) @derbycon #derbycon pic.twitter.com/Kn6KO9tUcb
— Frank McGovern (@FrankMcG) October 5, 2018
The Unintended Risks of Trusting Active Directory by Lee Christensen (@tifkin_ of @SpecterOps), Will Schroeder (@harmj0y of @SpecterOps), and Matt Nelson (@enigma0x3 of @SpecterOps) @DerbyCon #derbycon. pic.twitter.com/XcekX6izzZ
— Frank McGovern (@FrankMcG) October 5, 2018
How to put on a Con for Fun and (Non) Profit by Benny Karnes (@kungfujo), John Moore (@mournewind), Rick Hayes (@ragingotaku), Matt Perry (@sirgurdWV), Bill Gardner (@oncee), Justin Rogosky (@CptSexy), Mike Fry (@MichaelDFry), Steve Truax (@steventruax) @derbycon #derbycon. pic.twitter.com/e2BUQRLIoO
— Frank McGovern (@FrankMcG) October 6, 2018
Draw a Bigger Circle: InfoSec Evolves by Cheryl Biswas (@3ncr1pt3d of @TD_Canada) @derbycon #derbycon. pic.twitter.com/NjynfrXxhY
— Frank McGovern (@FrankMcG) October 5, 2018
Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community by Kathleen Smith (@YesItsKathleen), Magen Wu (@tottenkoph), Cindy Jones (@SinderzNAshes), Kathryn Seymour, Kirsten Renner @derbycon #derbycon. pic.twitter.com/XvmJY2KZTY
— Frank McGovern (@FrankMcG) October 6, 2018
The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs by Arian Evans (@arianevans) @derbycon #derbycon. pic.twitter.com/asz0XTKTkY
— Frank McGovern (@FrankMcG) October 6, 2018
Getting Control of Your Vendors Before They Take You Down by Dan Browder (@nevon) @derbycon #derbycon pic.twitter.com/PTisEacmj3
— Frank McGovern (@FrankMcG) October 7, 2018
Deploying Deceptive Systems: Luring Attackers from the Shadows by Kevin Gennuso (@kevvyg of @DICKS) @derbycon #derbycon pic.twitter.com/HakwKtK14m
— Frank McGovern (@FrankMcG) October 6, 2018
How to Influence Security Technology in Kiwi Underpants by Benjamin Delpy (@gentilkiwi) @derbycon #derbycon. pic.twitter.com/bLdl26gRDv
— Frank McGovern (@FrankMcG) October 5, 2018
Changing Our Mindset From Technical To Psychological Defenses by Andrew Kalat (@Lerg) @derbycon #derbycon pic.twitter.com/WBDYNYYBEx
— Frank McGovern (@FrankMcG) October 7, 2018
DEF CON, 2018
One-Click to OWA by William Martin (@quickbreach).@defcon #defcon #HackerSummerCamp pic.twitter.com/ZWzzGj03JQ
— Frank McGovern (@FrankMcG) August 10, 2018
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used in the Criminal Justice System by Dr. Jeanna N. Matthews (@jeanna_matthews), Nathan Adams, and Jerome Greco (@JeromeDGreco).@defcon #defcon #HackerSummerCamp pic.twitter.com/AUeWF22nQQ
— Frank McGovern (@FrankMcG) August 11, 2018
NSA Talks Cybersecurity by Rob Joyce (@RGB_Lights).@defcon #defcon #HackerSummerCamp pic.twitter.com/IOjEFLbuHp
— Frank McGovern (@FrankMcG) August 10, 2018
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 by Gabriel Ryan (@s0lst1c3).@defcon #defcon #HackerSummerCamp pic.twitter.com/v9nT7xmX4r
— Frank McGovern (@FrankMcG) August 10, 2018
Who Controls the Controllers—Hacking Crestron IoT Automation Systems by Ricky Lawshae (@HeadlessZeke).@defcon #defcon #HackerSummerCamp pic.twitter.com/wu7n9Nk8tT
— Frank McGovern (@FrankMcG) August 10, 2018
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones by Eduardo Izycki (@Dudarthur) and Rodrigo Colli (@Rodrigo_Colli).@defcon #defcon #HackerSummerCamp pic.twitter.com/wtBGg6vFDV
— Frank McGovern (@FrankMcG) August 11, 2018
Inside the Fake Science Factory by Svea Eckert (@sveckert), Chris Sumner (@5uggy), and Till Krause (@tillkrause).@defcon #defcon #HackerSummerCamp pic.twitter.com/wJnlmvUxpp
— Frank McGovern (@FrankMcG) August 11, 2018
Exploiting Active Directory Administrator Insecurities by Sean Metcalf (@PyroTek3).@defcon #defcon #HackerSummerCamp pic.twitter.com/BHPKsUcNfQ
— Frank McGovern (@FrankMcG) August 11, 2018
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills by Daniel Zolnikov (@DanielZolnikov).@defcon #defcon #HackerSummerCamp pic.twitter.com/kZA9XAMBfw
— Frank McGovern (@FrankMcG) August 12, 2018
Your Voice is my Passport by John Seymour (@_delta_zero) and Azeem Aqil.@defcon #defcon #HackerSummerCamp pic.twitter.com/Iol8ljwV9F
— Frank McGovern (@FrankMcG) August 10, 2018
Lost and Found Certificates: dealing with residual certificates for pre-owned domains by Ian Foster (@ianfoster) and Dylan Ayrey.@defcon #defcon #HackerSummerCamp pic.twitter.com/hLsoG5osZa
— Frank McGovern (@FrankMcG) August 12, 2018
Ridealong Adventures—Critical Issues with Police Body Cameras by Josh Mitchell (@bx_lr).@defcon #defcon #HackerSummerCamp pic.twitter.com/GsaeGKD1ew
— Frank McGovern (@FrankMcG) August 11, 2018
The Road to Resilience: How Real Hacking Redeems this Damnable Profession by Richard Thieme (@neuralcowboy).@defcon #defcon #HackerSummerCamp pic.twitter.com/Bz9nyDnap0
— Frank McGovern (@FrankMcG) August 12, 2018
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask) by @elinormills, @joegrand, @spacerog, @dotmudge, @weldpond, and more.@defcon #defcon #HackerSummerCamp pic.twitter.com/0bckjgze7B
— Frank McGovern (@FrankMcG) August 11, 2018
Reverse Engineering Windows Defender's Emulator by Alexei Bulazel (@0xAlexei).@defcon #Defcon #HackerSummerCamp pic.twitter.com/OHxRleb2Sv
— Frank McGovern (@FrankMcG) August 11, 2018
Black Hat USA, 2018
From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it by Sean Metcalf (@PyroTek3).@BlackHatEvents #BlackHat #BlackHatUSA #Blackhat18 #HackerSummerCamp pic.twitter.com/2SZwqEfAU0
— Frank McGovern (@FrankMcG) August 8, 2018
Is the Mafia Taking Over Cybercrime? By Jonathan Lusthaus of @UniofOxford.@BlackHatEvents #BlackHat #Blackhat2018 #blackhat18 #HackerSummerCamp pic.twitter.com/rWoPe7ZcVy
— Frank McGovern (@FrankMcG) August 9, 2018
Dissecting Non-Malicious Artifacts: One IP at a Time by Dani Goland (@DaniGoland of @VirusBay) and Ido Naor (@IdoNaor1 of @Kaspersky).@BlackHatEvents #Blackhat #Blackhat18 #BlackHat2018 #BlackHatUSA pic.twitter.com/0AQvVInR6U
— Frank McGovern (@FrankMcG) August 8, 2018
Lessons and Lulz: The 4th Annual Black Hat USA NOC Report by Bart Stump (@theStump3r of @goredsky) and Neil Wyler (@grifter801 of @RSAsecurity).@BlackHatEvents #blackhat #BlackHatUSA #BlackHat18 #HackerSummerCamp pic.twitter.com/FjRiFoUHa4
— Frank McGovern (@FrankMcG) August 10, 2018
AI & ML in Cyber Security – Why Algorithms are Dangerous by Raffael Marty (@raffaelmarty of @pixlcloud and @Forcepointsec).@BlackHatEvents #BlackHatUSA #blackhat #Blackhat18 #HackerSummerCamp pic.twitter.com/qdKkc3lhuW
— Frank McGovern (@FrankMcG) August 9, 2018
Identity Theft: Attacks on SSO Systems by Kelby Ludwig (@kelbyludwig of @duosec).@BlackHatEvents #blackhat #Blackhat18 #blackhatusa #HackerSummerCamp pic.twitter.com/lxyh4ph7L0
— Frank McGovern (@FrankMcG) August 9, 2018
Legal Landmines: How Law and Policy are Rapidly Shaping Information Security by Allison Bender (@AllisonJBender of @ZwillGen), Amit Elazari (@amitelazari of @UCBerkeley), Jennifer Granick (@granick of @ACLU), Joseph Mann (@josephmenn of @thomsonreuters), (1/2) pic.twitter.com/6JA2k03GRt
— Frank McGovern (@FrankMcG) August 8, 2018
ZEROing Trust: Do Zero Trust Approaches Deliver Real Security? By David Weston (@dwizzzleMSFT of @Microsoft).@BlackHatEvents #blackhat #BlackHat18 #BlackHatUSA #HackerSummerCamp pic.twitter.com/nkUkBxSiCg
— Frank McGovern (@FrankMcG) August 8, 2018
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key by Gianpaolo Russo of @MITREcorp, L Jean Camp of @IUBloomington, and Sanchari Das (@sancharidecrypt of @IUBloomington).@BlackHatEvents #Blackhat18 #blackhat #BlackHatUSA pic.twitter.com/gPy9IcSCWn
— Frank McGovern (@FrankMcG) August 9, 2018
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek (@JosephBialek of @Microsoft) and Nicolas Joly (@n_joly of @Microsoft).@BlackHatEvents #Blackhat #Blackhat18 #BlackHat2018 #BlackHatUSA #HackerSummerCamp pic.twitter.com/5nPCqhSXGH
— Frank McGovern (@FrankMcG) August 8, 2018
How can Someone with Autism Specifically Enhance the Cyber Security Workforce? by Casey Hurt (@hurt_casey of @DeptofDefense), Dr. Stacy Thayer, and Rhett Greenhagen of @mcafee.@BlackHatEvents #blackhat #BlackHatUSA #blackhat2018 #HackerSummerCamp pic.twitter.com/QWAhfogPNp
— Frank McGovern (@FrankMcG) August 9, 2018
Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes by Parisa Tabriz (@laparisa of @google).@BlackHatEvents #Blackhat18 #BlackHat #BlackHat2018 pic.twitter.com/8jbYH8Tw4D
— Frank McGovern (@FrankMcG) August 8, 2018