Hackers, Hooligans, Heists, & History
Offered By: NDC Conferences via YouTube
Course Description
Overview
Explore the fascinating world of cybersecurity through a comprehensive presentation based on over two decades of experience across 50+ countries. Delve into real-life histories and use cases of hackers, hooligans, and heists, tracing the evolution from mechanical computers to the Internet. Examine how acts of sabotage, fraud, and theft have been conducted with low risk and high reward, sometimes even with safe harbor from prosecution. Analyze the motivations of various bad actors, including insiders, hacktivists, cybercriminals, and nation-states, driven by money, politics, revenge, and ideology. Gain insights into the "who, how, and why" of cyberattacks, identifying both traditional and modern threat vectors organized by motives such as sabotage and espionage. Learn from detailed explorations of each threat actor type, supported by real-life use cases and personal accounts. Understand the industry's response to these threats and why traditional approaches are no longer effective. Discover new approaches to cybersecurity that focus on actual security effectiveness rather than the latest buzzwords or regulatory mandates. Reflect on the current state of cybersecurity investments and their lack of measurable results. Consider how organizations can better prioritize their security efforts, identify effective tools, and make informed decisions about resource allocation. Ultimately, gain valuable insights into improving cybersecurity practices and leaving past mistakes in the history books.
Syllabus
Intro
Background
Raise of Hands
The Worlds First Computer
Radio 1895
Mobile Phones
Joy Bubbles 2600 Hertz
Malware
Reddit Joke
Gary Ming
Jerome Crevel
Ten Days of Rain
North Korea
North Korea Attacks
Cyber Equalizer
German Tanks
AK47s
Smart Dust
Brazil
Petrobras
American Superconductor
Chinese Hacker
John Dillinger
The Cloud
Environmental Drift
Medieval History
Security Effectiveness Report
Bank Robbers
Taught by
NDC Conferences
Related Courses
Health Informatics: Data and Interoperability StandardsGeorgia Institute of Technology via edX Fractal Architecture
NDC Conferences via YouTube Strangling the Monolith - Applied Patterns & Practices from the Trenches
NDC Conferences via YouTube Refactoring Is Not Just Clickbait
NDC Conferences via YouTube Amazing Algorithms for Solving Problems in Software
NDC Conferences via YouTube