YoVDO

Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Public Policy Courses Cloud Security Courses

Course Description

Overview

Explore a comprehensive analysis of cybersecurity strategies in this Black Hat conference talk. Delve into the findings of a recent task force that identified key technologies, operational innovations, and public policies crucial for achieving security at scale. Discover how these innovations provide a greater defensive advantage per dollar spent compared to offensive measures. Learn about the top 10 technologies and next game-changing advancements in cybersecurity. Examine process innovations and policy default decisions that can reshape the cybersecurity landscape. Gain insights into the concept of a Cyber Independent Testing Lab and its potential impact. Analyze the current state of global cybersecurity efforts and their effectiveness. Address critical questions about attacker speed, technical solutions, cloud security, and the impact of government control on cyber defense strategies.

Syllabus

Introduction
Policy Talk
Defense Asymmetry
Central Strategy
Defense vs Offense
For 35 Years
Asymmetry of Offense
The Attacker Advantage
Saving the Internet
New York Cyber Task Force
The Idea
Externalities
Climate Change
Most Scale Least Cost
The Worst Policy
Top 10 Technologies
Next Game Changing Technologies
What So
Process Innovation
Policy Default Decisions
No Defense First
Cyber Independent Testing Lab
Conclusion
Global GDP
How are we doing
Last Slide
Questions
Are attackers getting faster
Technical solutions
Cloud security
No decline in China attacks
Impact of government control


Taught by

Black Hat

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera