The Infosec Crossroads

The Infosec Crossroads

Cooper via YouTube Direct link

Blueprint

47 of 51

47 of 51

Blueprint

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Infosec Crossroads

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Thought Process
  3. 3 The Attacks Evolve
  4. 4 Targets Have Shifted
  5. 5 Motivation
  6. 6 DDOS
  7. 7 Breaches
  8. 8 Perimeter
  9. 9 Hacks Happen
  10. 10 Browser Exploit
  11. 11 Nakatomi Space
  12. 12 Black Hat 2003
  13. 13 Exploits
  14. 14 Bug bounties
  15. 15 The problem with bug bounties
  16. 16 Dont play this game
  17. 17 How users behave
  18. 18 Advanced technology
  19. 19 User safety
  20. 20 User choice
  21. 21 Reactive approach
  22. 22 Compliance
  23. 23 The Golden Truth
  24. 24 Infosec Defense
  25. 25 Machine Learning
  26. 26 Stop 99 of malware
  27. 27 One percent of malware
  28. 28 We have to change
  29. 29 Intelligence
  30. 30 Proactive Security Testing
  31. 31 Collect everything
  32. 32 Our customers
  33. 33 Historical data
  34. 34 Moores law
  35. 35 The value of historical data
  36. 36 Battle of Two Narratives
  37. 37 Red Team
  38. 38 Who are you scared of
  39. 39 User ratings
  40. 40 User hardening efforts
  41. 41 Metrics
  42. 42 Shift the curve
  43. 43 Booby traps
  44. 44 Analysis decides actions
  45. 45 Block diagrams
  46. 46 Tracking
  47. 47 Blueprint
  48. 48 Buying from the top
  49. 49 Compliance and audits
  50. 50 Creativity
  51. 51 Business Value

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.