Completed
Breach Analysis
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
InfoSec Productization - David Kennedy
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Davids background
- 3 Todays topic
- 4 Why are we here
- 5 How are breaches happening
- 6 A funny story
- 7 What does one computer matter
- 8 Ransomware
- 9 Breach Analysis
- 10 Endpoint Compromise
- 11 How InfoSec evolved
- 12 Basic building blocks
- 13 We cried wolf
- 14 PCI
- 15 Target
- 16 Cyber Weapons
- 17 Funding
- 18 Recognition
- 19 Security Industry
- 20 Hot Market
- 21 Risk
- 22 Talent
- 23 Money
- 24 Rationale
- 25 Series A funding
- 26 Negativity
- 27 Security
- 28 We are getting better
- 29 Security is about taking what you can
- 30 Prioritization
- 31 Threats Challenges
- 32 What Does Work
- 33 Approach
- 34 Basics
- 35 People
- 36 Visibility
- 37 Stop buying stuff
- 38 What can you do
- 39 Disable local admin accounts
- 40 Deny access to admin shares
- 41 Honey tokens
- 42 Emek
- 43 Its not that bad
- 44 Staying positive
- 45 Originals
- 46 Giveaway Winner