Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture

Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture

NYU Tandon School of Engineering via YouTube Direct link

Breach time

14 of 24

14 of 24

Breach time

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 The Three Phases of Cybersecurity
  3. 3 About Me
  4. 4 Attribution is Impossible
  5. 5 How do we catch cyber criminals
  6. 6 Cyber attribution
  7. 7 Nothing worth stealing
  8. 8 Critical infrastructure
  9. 9 Information sharing
  10. 10 Cyber tool proliferation
  11. 11 We can solve this problem
  12. 12 Offense is easy
  13. 13 Speed of light
  14. 14 Breach time
  15. 15 Preventing everything
  16. 16 Outcomedriven metrics
  17. 17 Its all hopeless
  18. 18 Question
  19. 19 Realtime detection
  20. 20 Favorite data sources
  21. 21 Advice for new cybersecurity professionals
  22. 22 GDPR
  23. 23 China
  24. 24 Cloud security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.