Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
m
m
Line 92: Line 92:
 
<b>AI gets smart about cybersecurity
 
<b>AI gets smart about cybersecurity
 
</b><br>Read the CNET cybersecurity article here - http://cnet.co/2gxtOGn Cyberattacks have become more sophisticated and more dangerous. Here's how Las Vegas stays safe. Subscribe to CNET: http://cnet.co/2heRhep  Check out our playlists: http://cnet.co/2g8kcf4  Like us on Facebook: http://www.facebook.com/cnet
 
</b><br>Read the CNET cybersecurity article here - http://cnet.co/2gxtOGn Cyberattacks have become more sophisticated and more dangerous. Here's how Las Vegas stays safe. Subscribe to CNET: http://cnet.co/2heRhep  Check out our playlists: http://cnet.co/2g8kcf4  Like us on Facebook: http://www.facebook.com/cnet
|}
 
|}<!-- B -->
 
{|<!-- T -->
 
| valign="top" |
 
{| class="wikitable" style="width: 550px;"
 
||
 
<youtube>ojTz7bOjT6o</youtube>
 
<b>AI and Security
 
</b><br>In the future, every company will be using AI, which means that every company will need a secure infrastructure that addresses AI security concerns. At the same time, the domain of computer security has been revolutionized by AI techniques, including machine learning, planning, and automatic reasoning. What are the opportunities for researchers in both fields—security infrastructure and AI—to learn from each other and continue this fruitful collaboration? This session will cover two main topics. In the first half, we will discuss how AI techniques have changed security, using a case study of the DARPA Cyber Grand Challenge, where teams built systems that can reason about security in real time. In the second half, we will talk about security issues inherent in AI. How can we ensure the integrity of decisions from the AI that drives a business? How can we defend against adversarial control of training data? Together, we will identify common problems for future research.
 
|}
 
|<!-- M -->
 
| valign="top" |
 
{| class="wikitable" style="width: 550px;"
 
||
 
<youtube>kCW-_k8RgnM</youtube>
 
<b>EP 03: Inside DARPA’s Cyber Grand Challenge
 
</b><br>DARPA’s Cyber Grand Challenge in 2016 showed the world what's coming -- autonomous adversaries -- and raised serious questions. How can organizations react to something that makes decisions in milliseconds? How can you still have humans in the loop when reaction time is key? And how can organizations defend or stop something that increases its own cyber capabilities autonomously? In this episode we go behind the scenes for the first and only completely autonomous capture the flag competition at DEF CON 24 with Team ForAllSecure. Twitter: @Th3H4ck3rm1nd  thehackermind.com
 
 
|}
 
|}
 
|}<!-- B -->
 
|}<!-- B -->
Line 116: Line 99:
 
||
 
||
 
<youtube>ca-C3voZwpM</youtube>
 
<youtube>ca-C3voZwpM</youtube>
<b>eTdU1nyk4H0
+
<b>How Israel Rules The World Of Cyber Security | VICE on HBO
</b><br>BB9
+
</b><br>U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels to Tel Aviv to find out how Israel is on its way to becoming the world's top cyber superpower.  Subscribe to VICE News here: http://bit.ly/Subscribe-to-VICE-News  Check out VICE News for more: http://vicenews.com  Follow VICE News here: Facebook: https://www.facebook.com/vicenews
 
|}
 
|}
 
|<!-- M -->
 
|<!-- M -->
Line 124: Line 107:
 
||
 
||
 
<youtube>7RQH8oECSyg</youtube>
 
<youtube>7RQH8oECSyg</youtube>
<b>HH10
+
<b>Machine Learning Techniques for Cyber Security
</b><br>BB10
+
</b><br>An introduction to machine learning and its applications in cyber-security. Presented by Vahid Behzadan for the OWASP Nettacker team.
 
|}
 
|}
 
|}<!-- B -->
 
|}<!-- B -->
Line 133: Line 116:
 
||
 
||
 
<youtube>SdEPqFCC13U</youtube>
 
<youtube>SdEPqFCC13U</youtube>
<b>HH1
+
<b>Semi Supervised Learning In An Adversarial Environment
</b><br>BB1
+
</b><br>DataWorks Summit
 
|}
 
|}
 
|<!-- M -->
 
|<!-- M -->
Line 141: Line 124:
 
||
 
||
 
<youtube>t1Swvz2dpUQ</youtube>
 
<youtube>t1Swvz2dpUQ</youtube>
<b>HH2
+
<b>"Security: Computing in an Adversarial Environment," Carrie Gates
</b><br>BB2
+
</b><br>Apr. 12, 2012: "Security: Computing in an Adversarial Environment," presented by Carrie Gates, CA Labs; moderated by Christopher W. Clifton, Purdue University. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones...and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult.  What you'll learn:    * The security mindset -- what it is, why it's needed    * The social side of security -- usability, adoption, identity, trust
 +
  * A deeper dive on insider threat as a case study -- what it is, how to detect it, how to prevent it  Presenter: Carrie Gates, Senior Vice President and Director of Research, CA Labs  Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine.  Moderator:
 +
Christopher W. Clifton, Associate Professor of Computer Science, Purdue University  Dr. Clifton works on data privacy, particularly with respect to analysis of private data.
 
|}
 
|}
 
|}<!-- B -->
 
|}<!-- B -->

Revision as of 19:19, 5 October 2020

Youtube search... ...Google search


How to Plan for and Implement a Cybersecurity Strategy
Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today. Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets. What does a Cybersecurity architecture guide look like? What does the Cybersecurity landscape look like? What does the evolution of IT and Microsoft Security look like? What does a platform security approach look like? Can you describe the benefits of an Integrated Security Experience? How do you measure security success?

Nicolas Papernot - Private Machine Learning with PATE - Cybersecurity With The Best 2017
Cybersecurity With The Best hosted over 40 speakers and hundreds of attendees from all over the world on a single platform on October 14-15, 2017. Nicolas Papernot is a PhD student in Computer Science and Engineering advised by Dr. Patrick McDaniel at the Pennsylvania State University. His research interests lie at the intersection of computer security and deep learning. He is supported by a Google PhD Fellowship in Security.

Confessions of a cyber spy hunter | Eric Winsborrow | TEDxVancouver
With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology solutions. Eric and his company are at the forefront of the latest developments in the world of global espionage, and the merging of man and machine. He attests that the Hollywood-created image of the daring secret agent sneaking into a foreign government's laser protected server room to steal top secret information couldn't be further from modern reality. In fact, the "James Bond" of the 21st century doesn't just use a computer, he is the computer. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx

Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirkland
In 2014, Bryan Seely hacked the Secret Service and the FBI, and then turned himself in to alert authorities to the problem. He'll tell you what you can do about it in his very entertaining talk. Bryan Seely has garnered a great deal of national attention in the last year. He recognized there were some critical problems with the websites we use most often. He learned that not only is our personal security threatened, but so is our national security. To prove his point, Seely hacked the Secret Service and the FBI last year, and then turned himself in to alert authorities to the problem. He'll tell you what you can do about it in his very entertaining talk. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx

Evolution of AI Bots for Real-Time Adaptive Security
Thomas Caldwell, Sr. Director, WEBROOT AI bots historically emerged as chatbots. Early versions were rule-based, adding NLP and machine learning turned them into AI-based bots to be used in sales and support. Thousands of times faster than humans without fatigue, these AI bots have arrived. They are now being applied to Real-Time Adaptive Security. Analyzing cross domain context, events and weeding out false positives in milliseconds.

AI gets smart about cybersecurity
Read the CNET cybersecurity article here - http://cnet.co/2gxtOGn Cyberattacks have become more sophisticated and more dangerous. Here's how Las Vegas stays safe. Subscribe to CNET: http://cnet.co/2heRhep Check out our playlists: http://cnet.co/2g8kcf4 Like us on Facebook: http://www.facebook.com/cnet

How Israel Rules The World Of Cyber Security | VICE on HBO
U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels to Tel Aviv to find out how Israel is on its way to becoming the world's top cyber superpower. Subscribe to VICE News here: http://bit.ly/Subscribe-to-VICE-News Check out VICE News for more: http://vicenews.com Follow VICE News here: Facebook: https://www.facebook.com/vicenews

Machine Learning Techniques for Cyber Security
An introduction to machine learning and its applications in cyber-security. Presented by Vahid Behzadan for the OWASP Nettacker team.

Semi Supervised Learning In An Adversarial Environment
DataWorks Summit

"Security: Computing in an Adversarial Environment," Carrie Gates
Apr. 12, 2012: "Security: Computing in an Adversarial Environment," presented by Carrie Gates, CA Labs; moderated by Christopher W. Clifton, Purdue University. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones...and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult. What you'll learn: * The security mindset -- what it is, why it's needed * The social side of security -- usability, adoption, identity, trust

 * A deeper dive on insider threat as a case study -- what it is, how to detect it, how to prevent it   Presenter: Carrie Gates, Senior Vice President and Director of Research, CA Labs  Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine.  Moderator:

Christopher W. Clifton, Associate Professor of Computer Science, Purdue University Dr. Clifton works on data privacy, particularly with respect to analysis of private data.

HH3
BB3

HH4
BB4

HH5
BB5

HH6
BB6

Fraud Detection

HH1
BB1

HH2
BB2

HH3
BB3

HH4
BB4

Data Center Security

HH1
BB1

HH2
BB2

HH3
BB3

HH4
BB4

HH5
BB5

HH6
BB6