No InfoSec Staff? No Problem
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore a comprehensive approach to information security for organizations without dedicated InfoSec staff in this 24-minute conference talk from BSidesLV 2014. Learn about secondary responsibility syndrome, risk assessment for small businesses, legacy perimeter challenges, and effective security controls. Discover strategies for implementing technical controls, managing security risks, and fostering security awareness. Gain insights on how to sell security initiatives, create a blueprint for security measures, and address core information protection. Understand the importance of datacentric security and how to navigate common challenges such as password management and dealing with potential threats.
Syllabus
Intro
Secondary Responsibility Syndrome
Travel Guide
Small Business Enterprise
Legacy Perimeters
Risk is Real
Zombies
Developers
Blacklisting
Evil People
Lost Something
Whats Next
How to Sell
Risk Assessment
Blueprint
Security Controls
Passwords
Solo
Core Information
Technical Controls
Datacentric
Security Risk
Security Awareness
Taught by
BSidesLV
Related Courses
Information Security Management in a NutshellSAP Learning Enterprise and Infrastructure Security
New York University (NYU) via Coursera Personal Risk Reduction In Insecure Contexts
Politecnico di Milano via Polimi OPEN KNOWLEDGE Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Cyber Security Essentials: Your Role in Protecting the Company
Pluralsight