Rules of Engagement - Mitigating Risk in Information Security Work
Offered By: YouTube
Course Description
Overview
Learn essential strategies for mitigating risks in information security work from legal expert Richard Goldberg in this 31-minute conference talk from Dojocon 2010. Explore key topics including penetration testing, audits, data breaches, shareholder derivative actions, and subpoenas. Gain insights into developing effective rules of engagement, creating recovery plans, and implementing robust data security measures. Understand the legal implications of information security work and discover practical approaches to protect your organization from potential threats and liabilities.
Syllabus
Introduction
Disclaimer
Call It Art
Overview
Future Security
Penn Tests Audits
Data Breach
Shareholder Derivative
Subpoena
Rules of Engagement
Problem Assume
Recovery Plan
Response
Data Security
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent