YoVDO

Understanding the Cybersecurity Act of 2015

Offered By: YouTube

Tags

Conference Talks Courses Privacy Courses Cyber Threat Intelligence Courses Computer Fraud and Abuse Act Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the Cybersecurity Act of 2015 in this 52-minute conference talk from BSidesCharm 2017. Delve into the intricacies of information sharing legislation, examining existing laws such as the Wiretap Act, Stored Communications Act, and Computer Fraud Abuse Act. Learn about key components of the Cybersecurity Act, including honey tokens, integrated defenses, and cyber threat indicators. Understand the implications for privacy, liability, and antitrust concerns. Gain insights into the XML format for sharing threat information and discuss the concept of honeypiles. Conclude with a Q&A session to address any remaining questions about this significant piece of cybersecurity legislation.

Syllabus

Introduction
Disclosure
Cybersecurity Act of 2015
Information Sharing Bill
Existing Laws
Wiretap Act
Wiretap Exceptions
Stored Communications
Computer Fraud Abuse Act
Data Security Laws
Cybersecurity Act
Honey Tokens
Integrated defenses
Information sharing
Cyber threat indicators
XML format
Default example
Privacy
Liability
Antitrust
Conclusion
Questions
Honeypile


Related Courses

Cyber Threat Intelligence
IBM via Coursera
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning
The Future of Network Security and Defence
Coventry University via FutureLearn
Data Collection and Processing (CTIA Prep)
Pluralsight