YoVDO

Encryption Mobility Cloud - Oh My

Offered By: YouTube

Tags

Conference Talks Courses Encryption Courses Mobility Courses Cloud Security Courses Defense in Depth Courses Shadow IT Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolving landscape of cybersecurity challenges in this 29-minute conference talk from GrrCon 2016. Delve into critical topics such as Shadow IT, mobility, and the "Bermuda Triangle" of security risks. Examine the increasing importance of protecting personally identifiable information (PII) and the rising threat of ransomware. Analyze the shift in traditional data center connections and the emergence of the internet as the new data center. Discover why antivirus solutions are becoming obsolete and how cybercriminals are adapting their tactics, including the use of legitimate ad space. Learn about the concept of Defense in Depth and the growing significance of behavioral analysis in cybersecurity. Gain valuable insights into the three key things to remember in this rapidly changing digital security environment.

Syllabus

Introduction
Shadow IT
Mobility
The Bermuda Triangle
Why PII
Ransomware
Trusted Partner Attacks
The Entire Shift
The Defense Has Dissolved
Traditional Data Center Connection
The Internets New Data Center
Split Tunneling
Needle in a haystack
Antivirus is dead
The bad guys are buying legitimate ad space
Theyre keeping the cost down
Remember Droid Jack
Full Access
Evolution Ransomware
Defense in Depth
Behavioral Analysis
Questions
Three Things
Thank You


Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera