Completed
Business Value
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Infosec Crossroads
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Thought Process
- 3 The Attacks Evolve
- 4 Targets Have Shifted
- 5 Motivation
- 6 DDOS
- 7 Breaches
- 8 Perimeter
- 9 Hacks Happen
- 10 Browser Exploit
- 11 Nakatomi Space
- 12 Black Hat 2003
- 13 Exploits
- 14 Bug bounties
- 15 The problem with bug bounties
- 16 Dont play this game
- 17 How users behave
- 18 Advanced technology
- 19 User safety
- 20 User choice
- 21 Reactive approach
- 22 Compliance
- 23 The Golden Truth
- 24 Infosec Defense
- 25 Machine Learning
- 26 Stop 99 of malware
- 27 One percent of malware
- 28 We have to change
- 29 Intelligence
- 30 Proactive Security Testing
- 31 Collect everything
- 32 Our customers
- 33 Historical data
- 34 Moores law
- 35 The value of historical data
- 36 Battle of Two Narratives
- 37 Red Team
- 38 Who are you scared of
- 39 User ratings
- 40 User hardening efforts
- 41 Metrics
- 42 Shift the curve
- 43 Booby traps
- 44 Analysis decides actions
- 45 Block diagrams
- 46 Tracking
- 47 Blueprint
- 48 Buying from the top
- 49 Compliance and audits
- 50 Creativity
- 51 Business Value