Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace

Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace

Black Hat via YouTube Direct link

The Attacker Advantage

7 of 29

7 of 29

The Attacker Advantage

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Policy
  3. 3 Defense Asymmetry
  4. 4 Central Strategy
  5. 5 Defense vs Offense
  6. 6 Spending on Attack
  7. 7 The Attacker Advantage
  8. 8 What We Need to Do
  9. 9 New York Cyber Task Force
  10. 10 Defensible
  11. 11 Externalities
  12. 12 Climate Change
  13. 13 Most Scale Least Cost
  14. 14 What Was the Worst
  15. 15 Top 10 Technologies
  16. 16 What can we learn from these technologies
  17. 17 What makes these technologies special
  18. 18 Process innovation
  19. 19 Policy default decisions
  20. 20 No Defense First
  21. 21 Closing
  22. 22 Cyber Shangrila
  23. 23 How are we doing
  24. 24 Questions
  25. 25 Are attackers getting faster
  26. 26 Technical solutions
  27. 27 Cloud
  28. 28 China Attacks
  29. 29 Impact of Government Control

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.