{"id":21326,"date":"2016-01-29T12:47:10","date_gmt":"2016-01-29T20:47:10","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/01\/usenix-enigma-2016-nsa-tao-chief-on-disrupting-nation-state-hackers"},"modified":"2017-06-04T11:02:14","modified_gmt":"2017-06-04T18:02:14","slug":"usenix-enigma-2016-nsa-tao-chief-on-disrupting-nation-state-hackers","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/01\/usenix-enigma-2016-nsa-tao-chief-on-disrupting-nation-state-hackers","title":{"rendered":"USENIX Enigma 2016 \u2014 NSA TAO Chief on Disrupting Nation State Hackers"},"content":{"rendered":"<p><img decoding=\"async\" style=\"display:none;\" src=\"\"><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/bDJb8WOJYdA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Rob Joyce, Chief, Tailored Access Operations, National Security Agency.<\/p>\n<p>From his role as the Chief of NSA\u2019s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.<\/p>\n<p>Sign up to find out more about Enigma conferences:<br \/>\n<a href=\"https:\/\/www.usenix.org\/conference\/enigma2016#signup\" target=\"_blank\" title=\"https:\/\/www.usenix.org\/conference\/enigma2016#signup\" rel=\"nofollow\" dir=\"ltr\"><a href=\"https:\/\/www.usenix.org\/conference\/enigma2016#signup\">https:\/\/www.usenix.org\/conference\/enigma2016#signup<\/a><\/a><\/p>\n<p>Watch all Enigma 2016 videos at:<br \/>\n<a href=\"http:\/\/enigma.usenix.org\/youtube\" target=\"_blank\" title=\"http:\/\/enigma.usenix.org\/youtube\" rel=\"nofollow\" dir=\"ltr\"><a href=\"http:\/\/enigma.usenix.org\/youtube\">http:\/\/enigma.usenix.org\/youtube<\/a><\/a><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=bDJb8WOJYdA\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rob Joyce, Chief, Tailored Access Operations, National Security Agency. From his role as the Chief of NSA\u2019s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks. Sign up to find out more about Enigma conferences: https:\/\/www.usenix.org\/conference\/enigma2016#signup [\u2026]<\/p>\n","protected":false},"author":394,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,1412,1492],"tags":[],"class_list":["post-21326","post","type-post","status-publish","format-standard","hentry","category-habitats","category-privacy","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/21326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/394"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=21326"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/21326\/revisions"}],"predecessor-version":[{"id":63087,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/21326\/revisions\/63087"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=21326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=21326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=21326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}