Difference between revisions of "Cybersecurity"
m |
m |
||
| Line 48: | Line 48: | ||
|| | || | ||
<youtube>u-EQHbqWY60</youtube> | <youtube>u-EQHbqWY60</youtube> | ||
| − | <b> | + | <b>How to Plan for and Implement a Cybersecurity Strategy |
| − | </b><br> | + | </b><br>Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today. Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how [[Microsoft]] has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets. What does a Cybersecurity architecture guide look like? What does the Cybersecurity landscape look like? What does the evolution of IT and [[Microsoft]] Security look like? What does a platform security approach look like? Can you describe the benefits of an Integrated Security Experience? How do you measure security success? |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 56: | Line 56: | ||
|| | || | ||
<youtube>cjo_u_yT2wQ</youtube> | <youtube>cjo_u_yT2wQ</youtube> | ||
| − | <b> | + | <b>Nicolas Papernot - Private Machine Learning with PATE - Cybersecurity With The Best 2017 |
| − | </b><br> | + | </b><br>Cybersecurity With The Best hosted over 40 speakers and hundreds of attendees from all over the world on a single platform on October 14-15, 2017. Nicolas Papernot is a PhD student in Computer Science and Engineering advised by Dr. Patrick McDaniel at the Pennsylvania State University. His research interests lie at the intersection of computer security and deep learning. He is supported by a [[Google]] PhD Fellowship in Security. |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
| Line 65: | Line 65: | ||
|| | || | ||
<youtube>YiUN35Ikdfw</youtube> | <youtube>YiUN35Ikdfw</youtube> | ||
| − | <b> | + | <b>Confessions of a cyber spy hunter | Eric Winsborrow | TEDxVancouver |
| − | </b><br> | + | </b><br>With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology solutions. Eric and his company are at the forefront of the latest developments in the world of global espionage, and the merging of man and machine. He attests that the Hollywood-created image of the daring secret agent sneaking into a foreign government's laser protected server room to steal top secret information couldn't be further from modern reality. In fact, the "James Bond" of the 21st century doesn't just use a computer, he is the computer. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 73: | Line 73: | ||
|| | || | ||
<youtube>5c6AADI7Pb4</youtube> | <youtube>5c6AADI7Pb4</youtube> | ||
| − | <b> | + | <b>Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirkland |
| − | </b><br> | + | </b><br>In 2014, Bryan Seely hacked the Secret Service and the FBI, and then turned himself in to alert authorities to the problem. He'll tell you what you can do about it in his very entertaining talk. Bryan Seely has garnered a great deal of national attention in the last year. He recognized there were some critical problems with the websites we use most often. He learned that not only is our personal security threatened, but so is our national security. To prove his point, Seely hacked the Secret Service and the FBI last year, and then turned himself in to alert authorities to the problem. He'll tell you what you can do about it in his very entertaining talk. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
| Line 82: | Line 82: | ||
|| | || | ||
<youtube>SiAgnyUc-70</youtube> | <youtube>SiAgnyUc-70</youtube> | ||
| − | <b> | + | <b>Evolution of AI Bots for Real-Time Adaptive Security |
| − | </b><br> | + | </b><br>Thomas Caldwell, Sr. Director, WEBROOT AI bots historically emerged as chatbots. Early versions were rule-based, adding NLP and machine learning turned them into AI-based bots to be used in sales and support. Thousands of times faster than humans without fatigue, these AI bots have arrived. They are now being applied to Real-Time Adaptive Security. Analyzing cross domain context, events and weeding out false positives in milliseconds. |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 90: | Line 90: | ||
|| | || | ||
<youtube>zGBJ7iH0xOw</youtube> | <youtube>zGBJ7iH0xOw</youtube> | ||
| − | <b> | + | <b>AI gets smart about cybersecurity |
| − | </b><br> | + | </b><br>Read the CNET cybersecurity article here - http://cnet.co/2gxtOGn Cyberattacks have become more sophisticated and more dangerous. Here's how Las Vegas stays safe. Subscribe to CNET: http://cnet.co/2heRhep Check out our playlists: http://cnet.co/2g8kcf4 Like us on Facebook: http://www.facebook.com/cnet |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
Revision as of 18:56, 5 October 2020
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Defense: Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)
- Cybersecurity: Evaluating & Selling
- (Artificial) Immune System
- 5G Security
- Useful Models ...find outliers:
- Detecting Malicious Requests with Keras & TensorFlow | Adam Kusey - Medium
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
- Breaking Down the Tencent 2018 Cybersecurity Report
- Chronicle combines all the best parts of Google and X culture
- Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind
- The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture
- Watch me Build a Cybersecurity Startup | Siraj Raval
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia
|
|
|
|
Data Center Security
|
|
|
|
|
|