Difference between revisions of "Cybersecurity"
(→Selling & Evaluating) |
(→The Cybersecurity Framework - NIST) |
||
| Line 51: | Line 51: | ||
<youtube>5c6AADI7Pb4</youtube> | <youtube>5c6AADI7Pb4</youtube> | ||
| − | == The Cybersecurity Framework - NIST == | + | == The Cybersecurity Framework - NIST & DHS == |
[http://www.youtube.com/results?search_query=cybersecurity+Framework+NIST YouTube search...] | [http://www.youtube.com/results?search_query=cybersecurity+Framework+NIST YouTube search...] | ||
| Line 59: | Line 59: | ||
* [http://www.sei.cmu.edu/research-capabilities/cybersecurity/index.cfm Cybersecurity - Software Engineering Institute | Carnegie Mellon] | * [http://www.sei.cmu.edu/research-capabilities/cybersecurity/index.cfm Cybersecurity - Software Engineering Institute | Carnegie Mellon] | ||
| + | <youtube>te1drIJAUy0</youtube> | ||
| + | <youtube>cvcKRp-E-8o</youtube> | ||
<youtube>7ECjQOX2cTw</youtube> | <youtube>7ECjQOX2cTw</youtube> | ||
| − | <youtube> | + | <youtube>f6Hp5SQFOXw</youtube> |
Revision as of 14:30, 11 June 2018
Contents
Darktrace
Watson
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
General Cybersecurity
- Cybersecurity Systems Security | MIT
- 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor | CIO
The Cybersecurity Framework - NIST & DHS
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon