Difference between revisions of "Cybersecurity"
| Line 4: | Line 4: | ||
* [[Offense - Adversarial Threats/Attacks]] | * [[Offense - Adversarial Threats/Attacks]] | ||
* [[Capabilities]] | * [[Capabilities]] | ||
| + | * [http://www.youtube.com/watch?v=GqmQg-cszw4&list=PLUl4u3cNGP62K2DjQLRxDNRi0z2IRWnNh&index=1 Cybersecurity Systems Security | MIT] | ||
| + | * [http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.html 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor | CIO] | ||
| + | <youtube>YiUN35Ikdfw</youtube> | ||
| + | <youtube>5c6AADI7Pb4</youtube> | ||
<youtube>JNAu-wn3y0k</youtube> | <youtube>JNAu-wn3y0k</youtube> | ||
<youtube>SiAgnyUc-70</youtube> | <youtube>SiAgnyUc-70</youtube> | ||
| Line 30: | Line 34: | ||
<youtube>xG9jazUpEus</youtube> | <youtube>xG9jazUpEus</youtube> | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
== National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS) == | == National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS) == | ||
Revision as of 08:21, 28 June 2018
- Defense - Anomaly Detection
- Offense - Adversarial Threats/Attacks
- Capabilities
- Cybersecurity Systems Security | MIT
- 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor | CIO
Contents
Darktrace
Watson
National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Federal Risk and Authorization Management Program (FedRAMP) | NIST
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Strategy .pdf | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence