Difference between revisions of "Cybersecurity"
(→National Institute of Standards and Technology (NIST) & U.S. DEPARTMENT OF HOMELAND SECURITY (DHS)) |
|||
| Line 1: | Line 1: | ||
| − | [http://www.youtube.com/results?search_query=cybersecurity+ | + | [http://www.youtube.com/results?search_query=cybersecurity+security+RSA+malware+detection+artificial+intelligence+deep+learning Youtube search...] |
* [[Defense - Anomaly Detection]] | * [[Defense - Anomaly Detection]] | ||
| Line 5: | Line 5: | ||
* [[Capabilities]] | * [[Capabilities]] | ||
| + | <youtube>JNAu-wn3y0k</youtube> | ||
| + | <youtube>SiAgnyUc-70</youtube> | ||
<youtube>zGBJ7iH0xOw</youtube> | <youtube>zGBJ7iH0xOw</youtube> | ||
<youtube>ojTz7bOjT6o</youtube> | <youtube>ojTz7bOjT6o</youtube> | ||
| Line 28: | Line 30: | ||
<youtube>xG9jazUpEus</youtube> | <youtube>xG9jazUpEus</youtube> | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
== General Cybersecurity == | == General Cybersecurity == | ||
| Line 65: | Line 55: | ||
<youtube>7ECjQOX2cTw</youtube> | <youtube>7ECjQOX2cTw</youtube> | ||
<youtube>f6Hp5SQFOXw</youtube> | <youtube>f6Hp5SQFOXw</youtube> | ||
| + | |||
| + | == Selling & Evaluating == | ||
| + | [http://www.youtube.com/results?search_query=~Evaluating+cyber+~Security+~products+artifical+intelligence+ai+ YouTube search...] | ||
| + | |||
| + | Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction? | ||
| + | |||
| + | * Outcomes evaluation, not processing | ||
| + | * Product currently being used, or has been validated in a proof of concept (POC) trial | ||
| + | * Interaction with human intelligence | ||
| + | |||
| + | <youtube>xoBWBNsjWoM</youtube> | ||
| + | <youtube>-5dr1DCh_CU</youtube> | ||
| + | <youtube>LB6Yk2wh81E</youtube> | ||
| + | <youtube>rcG_QL9GWaA</youtube> | ||
Revision as of 08:19, 28 June 2018
Contents
Darktrace
Watson
General Cybersecurity
- Cybersecurity Systems Security | MIT
- 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor | CIO
National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Federal Risk and Authorization Management Program (FedRAMP) | NIST
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Strategy .pdf | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence