Completed
Favorite data sources
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 The Three Phases of Cybersecurity
- 3 About Me
- 4 Attribution is Impossible
- 5 How do we catch cyber criminals
- 6 Cyber attribution
- 7 Nothing worth stealing
- 8 Critical infrastructure
- 9 Information sharing
- 10 Cyber tool proliferation
- 11 We can solve this problem
- 12 Offense is easy
- 13 Speed of light
- 14 Breach time
- 15 Preventing everything
- 16 Outcomedriven metrics
- 17 Its all hopeless
- 18 Question
- 19 Realtime detection
- 20 Favorite data sources
- 21 Advice for new cybersecurity professionals
- 22 GDPR
- 23 China
- 24 Cloud security