Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
(Selling & Evaluating)
(The Cybersecurity Framework - NIST)
Line 51: Line 51:
 
<youtube>5c6AADI7Pb4</youtube>
 
<youtube>5c6AADI7Pb4</youtube>
  
== The Cybersecurity Framework - NIST ==
+
== The Cybersecurity Framework - NIST & DHS ==
 
[http://www.youtube.com/results?search_query=cybersecurity+Framework+NIST YouTube search...]
 
[http://www.youtube.com/results?search_query=cybersecurity+Framework+NIST YouTube search...]
  
Line 59: Line 59:
 
* [http://www.sei.cmu.edu/research-capabilities/cybersecurity/index.cfm Cybersecurity - Software Engineering Institute | Carnegie Mellon]
 
* [http://www.sei.cmu.edu/research-capabilities/cybersecurity/index.cfm Cybersecurity - Software Engineering Institute | Carnegie Mellon]
  
 +
<youtube>te1drIJAUy0</youtube>
 +
<youtube>cvcKRp-E-8o</youtube>
 
<youtube>7ECjQOX2cTw</youtube>
 
<youtube>7ECjQOX2cTw</youtube>
<youtube>cvcKRp-E-8o</youtube>
+
<youtube>f6Hp5SQFOXw</youtube>

Revision as of 14:30, 11 June 2018

Youtube search...

Darktrace

Youtube search...

Watson

Youtube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence

General Cybersecurity

YouTube search...

The Cybersecurity Framework - NIST & DHS

YouTube search...