YoVDO

Rules of Engagement - Mitigating Risk in Information Security Work

Offered By: YouTube

Tags

Dojocon Courses Penetration Testing Courses Risk Mitigation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn essential strategies for mitigating risks in information security work from legal expert Richard Goldberg in this 31-minute conference talk from Dojocon 2010. Explore key topics including penetration testing, audits, data breaches, shareholder derivative actions, and subpoenas. Gain insights into developing effective rules of engagement, creating recovery plans, and implementing robust data security measures. Understand the legal implications of information security work and discover practical approaches to protect your organization from potential threats and liabilities.

Syllabus

Introduction
Disclaimer
Call It Art
Overview
Future Security
Penn Tests Audits
Data Breach
Shareholder Derivative
Subpoena
Rules of Engagement
Problem Assume
Recovery Plan
Response
Data Security


Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent