Difference between revisions of "Cybersecurity"
| Line 12: | Line 12: | ||
<youtube>SdEPqFCC13U</youtube> | <youtube>SdEPqFCC13U</youtube> | ||
<youtube>t1Swvz2dpUQ</youtube> | <youtube>t1Swvz2dpUQ</youtube> | ||
| + | |||
== Evaluating Security Offerings == | == Evaluating Security Offerings == | ||
| Line 23: | Line 24: | ||
<youtube>xoBWBNsjWoM</youtube> | <youtube>xoBWBNsjWoM</youtube> | ||
| + | |||
| + | == General Cybersecurity == | ||
| + | [http://www.youtube.com/results?search_query=cyber+~security YouTube search...] | ||
| + | |||
| + | <youtube>YiUN35Ikdfw</youtube> | ||
| + | <youtube>5c6AADI7Pb4</youtube> | ||
Revision as of 11:24, 11 June 2018
Evaluating Security Offerings
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
General Cybersecurity