Building a Resiliency Program to Protect Business

Building a Resiliency Program to Protect Business

via YouTube Direct link

We have created the Perfect Storm

9 of 23

9 of 23

We have created the Perfect Storm

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Building a Resiliency Program to Protect Business

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A little about me
  3. 3 History of Hacking (Snapshot)
  4. 4 Hollywood's Romanticized "Hackers"
  5. 5 A New Type of Attack?
  6. 6 Adaptive Penetration Testing
  7. 7 APT2 Concept
  8. 8 Denial of Threat
  9. 9 We have created the Perfect Storm
  10. 10 Attack Vectors
  11. 11 The Compliance Problem
  12. 12 Attack Behavior (Welcome to Reality 101)
  13. 13 APT2 Rationale
  14. 14 APT Rationale
  15. 15 Case Study
  16. 16 Compliance Based Pen Tests
  17. 17 Business Driven Pen Tests
  18. 18 Where do you see business value?
  19. 19 Taxonomy of Criminal Attack
  20. 20 Attack Dimensions
  21. 21 Addressing the Advanced Persistent Threat
  22. 22 APT Resiliency Model
  23. 23 My Contact Information

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.