YoVDO

Understanding the Cybersecurity Act of 2015

Offered By: YouTube

Tags

Conference Talks Courses Privacy Courses Cyber Threat Intelligence Courses Computer Fraud and Abuse Act Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the Cybersecurity Act of 2015 in this 52-minute conference talk from BSidesCharm 2017. Delve into the intricacies of information sharing legislation, examining existing laws such as the Wiretap Act, Stored Communications Act, and Computer Fraud Abuse Act. Learn about key components of the Cybersecurity Act, including honey tokens, integrated defenses, and cyber threat indicators. Understand the implications for privacy, liability, and antitrust concerns. Gain insights into the XML format for sharing threat information and discuss the concept of honeypiles. Conclude with a Q&A session to address any remaining questions about this significant piece of cybersecurity legislation.

Syllabus

Introduction
Disclosure
Cybersecurity Act of 2015
Information Sharing Bill
Existing Laws
Wiretap Act
Wiretap Exceptions
Stored Communications
Computer Fraud Abuse Act
Data Security Laws
Cybersecurity Act
Honey Tokens
Integrated defenses
Information sharing
Cyber threat indicators
XML format
Default example
Privacy
Liability
Antitrust
Conclusion
Questions
Honeypile


Related Courses

Neuroethics
University of Pennsylvania via Coursera
Fundamentals of Online Education: Planning and Application
Georgia Institute of Technology via Coursera
Understanding Media by Understanding Google
Northwestern University via Coursera
Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection
Cornell University via edX
Internet, les autres et moi
Certificat informatique et internet via France Université Numerique