Fighting Advanced Persistent Threats with Advanced Persistent Security
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced strategies for combating persistent cyber threats in this conference talk from SecureWV/Hack3rcon 2017. Delve into the world of sophisticated attacks, examining real-world examples like the IRS breach, Ashley Madison hack, and Anthem data theft. Learn to leverage security hype to your advantage, understand the Detection Deficit Disorder, and implement the IRI Rules. Discover common vulnerabilities, risk management techniques, and the importance of multifactor authentication. Gain insights on assuming failure, improving detection and protection mechanisms, and allocating security budgets effectively. Master the art of fighting Advanced Persistent Threats with Advanced Persistent Security strategies.
Syllabus
Intro
Iras first experience speaking in the Bible Belt
Why this presentation came about
Why the hype matters
Did your security program really suck
Sophisticated attacks
Use hype to your advantage
Hacking Team
Was this sophisticated
IRS breach
What do they need
Ashley Madison
SQL Injection
ISIS Hacks
Anthem Hack
Watering Hole Attack
The Detection Deficit Disorder
The IRS Attack
The IRI Rules
Common Vulnerabilities
Advanced Persistent Threats
Risk Management
Impolite Failure
Potential Loss
Security Budget
Multifactor Authentication
Assume Failure
Detection
Protection
Detecting
Security
Related Courses
Security Principles(ISC)² via Coursera Emergency and Disaster Training and Exercising: An Introduction
Coventry University via FutureLearn A General Approach to Risk Management
University System of Georgia via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)
Amazon Web Services via AWS Skill Builder