Rebuilding and Transforming an Information Security Function
Offered By: YouTube
Course Description
Overview
Explore a keynote presentation on rebuilding and transforming an information security function, delivered by Susan Koski at Central Ohio Infosec 2015. Gain insights into regulatory perspectives, strategic planning, and guiding principles for effective information security management. Learn about crucial aspects such as identity access management, security awareness, and threat intelligence. Discover practical approaches to enhance your organization's security posture through this comprehensive 52-minute talk, which concludes with a Q&A session to address specific concerns and challenges in the field.
Syllabus
Introduction
Rebuilding and Transforming
Regulatory Perspective
Strategic Planning
Guiding Principles
Identity Access Management
Security Awareness
Threat Intelligence
Questions
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube