YoVDO

Understanding the Cybersecurity Act of 2015

Offered By: YouTube

Tags

Conference Talks Courses Privacy Courses Cyber Threat Intelligence Courses Computer Fraud and Abuse Act Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the Cybersecurity Act of 2015 in this 52-minute conference talk from BSidesCharm 2017. Delve into the intricacies of information sharing legislation, examining existing laws such as the Wiretap Act, Stored Communications Act, and Computer Fraud Abuse Act. Learn about key components of the Cybersecurity Act, including honey tokens, integrated defenses, and cyber threat indicators. Understand the implications for privacy, liability, and antitrust concerns. Gain insights into the XML format for sharing threat information and discuss the concept of honeypiles. Conclude with a Q&A session to address any remaining questions about this significant piece of cybersecurity legislation.

Syllabus

Introduction
Disclosure
Cybersecurity Act of 2015
Information Sharing Bill
Existing Laws
Wiretap Act
Wiretap Exceptions
Stored Communications
Computer Fraud Abuse Act
Data Security Laws
Cybersecurity Act
Honey Tokens
Integrated defenses
Information sharing
Cyber threat indicators
XML format
Default example
Privacy
Liability
Antitrust
Conclusion
Questions
Honeypile


Related Courses

Supreme Court's Van Buren Ruling on the CFAA - Implications and Analysis
Association for Computing Machinery (ACM) via YouTube
What Public Interest AI Auditors Can Learn from Security Testing - Legislative and Practical Wins
USENIX Enigma Conference via YouTube
Smashing the ML Stack for Fun and Lawsuits
Black Hat via YouTube
How Federal Prosecutors Use The CFAA
Black Hat via YouTube
The Big Chill - Legal Landmines that Stifle Security Research and How to Disarm Them
Black Hat via YouTube