Silos to Seamless - Creating a Comprehensive Security Program
Offered By: YouTube
Course Description
Overview
Explore the critical aspects of creating a comprehensive security program in this 33-minute conference talk from Central Ohio Infosec 2015. Delve into the importance of cybersecurity in today's threat landscape, examining the lessons learned from 2014's major security incidents. Gain insights on advanced persistent threats, critical asset protection, and the causes of data breaches across various industries. Learn effective strategies for vulnerability scanning, threat modeling, and incident response planning. Discover how to build a robust security program that transitions from siloed approaches to seamless integration, while also considering the human element in cybersecurity.
Syllabus
Introduction
Why are we here
Cyber security now trumps terrorism
What we saw in 2014
Advanced persistent threats
Critical asset protection
Protecting information assets
Causes of data breaches
Data breaches by industry
Critical infrastructure assets
Vulnerability scanning
How to build a program
Threat modeling
Incident response planning
Humanism
Related Courses
Менеджмент информационной безопасностиHigher School of Economics via Coursera Planning a Security Incident Response
Microsoft via edX Identifying Security Vulnerabilities
University of California, Davis via Coursera Secure Coding Practices
University of California, Davis via Coursera Atlas Security
MongoDB University