Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 15: Line 15:
 
<youtube>L3200ry4ysw</youtube>
 
<youtube>L3200ry4ysw</youtube>
  
== Evaluating Security Offerings ==
+
== Selling & Evaluating ==
 
[http://www.youtube.com/results?search_query=~Evaluating+cyber+~Security+~products+artifical+intelligence+ai+ YouTube search...]
 
[http://www.youtube.com/results?search_query=~Evaluating+cyber+~Security+~products+artifical+intelligence+ai+ YouTube search...]
  
Line 25: Line 25:
  
 
<youtube>xoBWBNsjWoM</youtube>
 
<youtube>xoBWBNsjWoM</youtube>
<youtube>5dr1DCh_CU</youtube>
+
<youtube>-5dr1DCh_CU</youtube>
  
 
== General Cybersecurity ==
 
== General Cybersecurity ==

Revision as of 13:09, 11 June 2018

Youtube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence

General Cybersecurity

YouTube search...