YoVDO

Automating Security Controls Using Models and Security Orchestration

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Identity and Access Management Courses

Course Description

Overview

Explore model-driven security approaches to combat rapidly evolving cyber threats in this 48-minute RSA Conference talk. Discover how organizations can move beyond simple anomaly detection to implement dynamic, automated security controls. Learn about the concept of model-driven security, its applications in dynamic provisioning, and strategies for implementation. Gain insights into identity and access management, security data analytics, and how to leverage data warehouses and rule-based security systems. Examine real-world examples, risk scoring methodologies, and the role of password vaulting and Data Loss Prevention (DLP) in a comprehensive security strategy. Understand the importance of security orchestration, third-party risk management, and performance metrics in building a robust cybersecurity framework. Ideal for security professionals seeking to enhance their organization's ability to respond swiftly and effectively to emerging threats like NotPetya.

Syllabus

Introduction
NotPetya
Model Driven Security
Data Warehouse
RuleBased Security
Example
Risk Scores
Password Vaulting
DLP
Security orchestration
Dynamic provisioning
Not Petya
Models
Questions
ThirdParty Risk
Scoring Base
Performance Management
SIM
Clarification


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube