Steve’s keynote will focus on achieving successful security outcomes using atypical-yet-practical technical techniques and embracing atypical approaches for thinking about and addressing security risks. Booby traps, canaries, and hibernating services? Yes. Allowing shared accounts and eliminating privileged accounts? Perhaps. Threat modeling? Absolutely. You don’t need magic bullets, but you need to challenge the status quo, think critically, and break out of your comfort zone. Challenge accepted...?