Trust While Computing
Think While Computing
Talking while Computing
Global security strategy and diplomacy
The key difference comes down to intent and actions – ‘white hats’ focus on the common good; ‘black hats’ care about financial gain or causing chaos
Nothing, they are the same
“White hats” are employed by credible companies or organizations, while “black hats” live on the fringes of society and work for themselves
"White hats" manage vulnerabilities and "Black hats" exclusively protect against DDOS attacks
Click on links in emails or IMs even if the come from people you don't know
Minimize details that identify you or your whereabouts
Keep your account numbers, user names, and passwords secret
Use the same or very similar passwords for every website or device
Gov’t stakeholders, policy makers
Business leaders, executives
IT decision makers
After a particularly lengthy interview, a top-tier journalist congratulated the spokesperson saying "I’m very glad you are not a shithead." The spokesperson didn't skip a beat, responding with, "my pleasure."
At a recent hacking conference, the team helped organize a dance off (putting it mildly) between hackers, researchers, journalists, spokespeople, and the team. Needless to say, Chris Williams served the whole bunch with carefully articulated pop-n-locking.
After forging a strong bond at a team offsite, a couple TwC team members and a client began rock climbing. On a trek to summit Mount Rainier, the team were stranded together for a day/night. Fortunately the team stayed strong and didn't revert to cannibalism.
The team incurred the wrath of California Pizza Kitchen's security team (who knew) during a rousing team lunch. Save some details, the team acted professionally amidst countless mistakes by the waitstaff. In the end, the team received a free lunch and got banned from returning.