YoVDO

Automating Security Controls Using Models and Security Orchestration

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Identity and Access Management Courses

Course Description

Overview

Explore model-driven security approaches to combat rapidly evolving cyber threats in this 48-minute RSA Conference talk. Discover how organizations can move beyond simple anomaly detection to implement dynamic, automated security controls. Learn about the concept of model-driven security, its applications in dynamic provisioning, and strategies for implementation. Gain insights into identity and access management, security data analytics, and how to leverage data warehouses and rule-based security systems. Examine real-world examples, risk scoring methodologies, and the role of password vaulting and Data Loss Prevention (DLP) in a comprehensive security strategy. Understand the importance of security orchestration, third-party risk management, and performance metrics in building a robust cybersecurity framework. Ideal for security professionals seeking to enhance their organization's ability to respond swiftly and effectively to emerging threats like NotPetya.

Syllabus

Introduction
NotPetya
Model Driven Security
Data Warehouse
RuleBased Security
Example
Risk Scores
Password Vaulting
DLP
Security orchestration
Dynamic provisioning
Not Petya
Models
Questions
ThirdParty Risk
Scoring Base
Performance Management
SIM
Clarification


Taught by

RSA Conference

Related Courses

Essential Google Cloud Infrastructure: Core Services
Google Cloud via Coursera
Essential Cloud Infrastructure: Core Services en EspaƱol
Google Cloud via Coursera
Managing Security in Google Cloud
Google Cloud via Coursera
Deploying SAP on Google Cloud
Google Cloud via Coursera
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy