YoVDO

Making Security Automation Real

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Network Security Courses Cyber Attacks Courses Vulnerability Management Courses Security Automation Courses

Course Description

Overview

Explore a comprehensive vision for the future of network security in this 46-minute RSA Conference talk. Learn how standardized posture information collection and security automation can revolutionize network defense against intrusions. Understand the current challenges facing security professionals, including the impact of disconnected defensive systems. Discover a three-step approach to security automation and delve into practical solutions such as SWID tags for software identification and ROLIE for vulnerability management. Gain insights into event-driven posture collection, supply chain risk management, and the latest updates on the Security Content Automation Protocol (SCAP) 2.0. Apply these concepts to strengthen your organization's network defenses and stay ahead of evolving threats.

Syllabus

RSAConference 2019 San Francisco March 4-8 Moscone Center
Attacks Cause Collateral Damage
CIS Top 20
Security Automation in Three Simple Steps
How can we perform these steps?
What is an Endpoint?
Use SWID Tags to identify Software
Correlate Device Identities
Proposal #1: Collect Event-Driven Posture
Vulnerability Discovery, Exploitation and Remediation
ROLIE and its Use Cases
Leverage vulnerability information
Vulnerability Information and Supply Chain Risk Management
Vulnerability Management on the Network
Apply What You Have Learned Today
Security Content Automation Protocol (SCAP) 2.0 Update


Taught by

RSA Conference

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity