Silos to Seamless - Creating a Comprehensive Security Program
Offered By: YouTube
Course Description
Overview
Explore the critical aspects of creating a comprehensive security program in this 33-minute conference talk from Central Ohio Infosec 2015. Delve into the importance of cybersecurity in today's threat landscape, examining the lessons learned from 2014's major security incidents. Gain insights on advanced persistent threats, critical asset protection, and the causes of data breaches across various industries. Learn effective strategies for vulnerability scanning, threat modeling, and incident response planning. Discover how to build a robust security program that transitions from siloed approaches to seamless integration, while also considering the human element in cybersecurity.
Syllabus
Introduction
Why are we here
Cyber security now trumps terrorism
What we saw in 2014
Advanced persistent threats
Critical asset protection
Protecting information assets
Causes of data breaches
Data breaches by industry
Critical infrastructure assets
Vulnerability scanning
How to build a program
Threat modeling
Incident response planning
Humanism
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network