YoVDO

Applying the 32 Zombieland Rules to IT Security - Larry Pesce

Offered By: YouTube

Tags

DerbyCon Courses Incident Response Courses Risk Assessment Courses Security Awareness Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a unique approach to IT security through this DerbyCon 3.0 conference talk that applies the "32 Zombieland Rules" to cybersecurity practices. Learn how to adapt survival strategies from the popular zombie apocalypse movie to protect your digital assets and infrastructure. Discover innovative ways to stay vigilant, prepare for threats, and respond effectively to security challenges. Gain insights on topics such as risk assessment, incident response, team collaboration, and personal preparedness in the context of IT security. Examine practical tips and humorous analogies that make complex security concepts more accessible and memorable. Enhance your cybersecurity mindset and develop a comprehensive approach to defending against digital threats by applying these unconventional yet effective principles.

Syllabus

Intro
Applying the "32"
About me
A family affair
This presentation...
Why Zombieland?
Cardio
The Double Tap
Beware of Bathrooms
Seatbelts
No Attachments
The Skillet
Travel Light
Get a Kickass Partner
With Your Bare Hands** . When no weapons are
Don't Swing Low
Use Your Foot
Bounty Paper Towels
Shake it Off
Always Carry a Change of Underwear
Bowling Ball
Opportunity Knocks
Don't Be a Hero
Limber Up
Break it Up
It's a Marathon Not a Sprint, Unless It's a Sprint, Then Sprint
Avoid Strip Clubs
When in Doubt, Know Your Way Out
Ziplock
Use Your Thumbs
Shoot First
A Little Sunscreen Never Hurt Anybody
Incoming!
#28 Double-Knot Your Shoes
#29 The Buddy System
Pack Your Stain Stick** • Pre-treat your messes, because it WILL get
Check the Back Seat
Enjoy the Little Things
Swiss Army Knife
Faaaaaanks!


Related Courses

Information Security Management in a Nutshell
SAP Learning
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Personal Risk Reduction In Insecure Contexts
Politecnico di Milano via Polimi OPEN KNOWLEDGE
Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight
Cyber Security Essentials: Your Role in Protecting the Company
Pluralsight