Completed
The value of historical data
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Infosec Crossroads
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Thought Process
- 3 The Attacks Evolve
- 4 Targets Have Shifted
- 5 Motivation
- 6 DDOS
- 7 Breaches
- 8 Perimeter
- 9 Hacks Happen
- 10 Browser Exploit
- 11 Nakatomi Space
- 12 Black Hat 2003
- 13 Exploits
- 14 Bug bounties
- 15 The problem with bug bounties
- 16 Dont play this game
- 17 How users behave
- 18 Advanced technology
- 19 User safety
- 20 User choice
- 21 Reactive approach
- 22 Compliance
- 23 The Golden Truth
- 24 Infosec Defense
- 25 Machine Learning
- 26 Stop 99 of malware
- 27 One percent of malware
- 28 We have to change
- 29 Intelligence
- 30 Proactive Security Testing
- 31 Collect everything
- 32 Our customers
- 33 Historical data
- 34 Moores law
- 35 The value of historical data
- 36 Battle of Two Narratives
- 37 Red Team
- 38 Who are you scared of
- 39 User ratings
- 40 User hardening efforts
- 41 Metrics
- 42 Shift the curve
- 43 Booby traps
- 44 Analysis decides actions
- 45 Block diagrams
- 46 Tracking
- 47 Blueprint
- 48 Buying from the top
- 49 Compliance and audits
- 50 Creativity
- 51 Business Value