Completed
Why Compromise
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Automated Human Vulnerability Scanning With AVA
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Breaking conventions
- 3 You might feel uncomfortable
- 4 What are we discussing
- 5 I like people
- 6 Weve conquered it
- 7 Theyre relatively lazy
- 8 Technology
- 9 Vulnerability
- 10 Defense
- 11 Compliance
- 12 Shame victims
- 13 We are connected species
- 14 We do bits and pieces
- 15 We dont test
- 16 Why we dont test
- 17 Border devices arent enough
- 18 What is AVA
- 19 What does AVA mean
- 20 Phases
- 21 Principle of Least Privilege
- 22 Pulling Information
- 23 Phishing Attacks
- 24 Honeypot SMS
- 25 Powerplay
- 26 Call to Action
- 27 Giving the option of succeeding
- 28 Behavior over time
- 29 Training is big business
- 30 Graphs
- 31 Predictive Behavior Analysis
- 32 Boring Technologies
- 33 Demo
- 34 Case Study
- 35 Public Interest Security Tool
- 36 Threat Intelligence Application Security
- 37 Spam
- 38 Privacy
- 39 Complexity
- 40 Scale of Data
- 41 Why Compromise
- 42 Why We Need Unicorns
- 43 Nest
- 44 Google
- 45 Learn more
- 46 Questions