How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10

How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10

DefCamp via YouTube Direct link

Introduction

1 of 22

1 of 22

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who is Telus
  3. 3 What is IT security
  4. 4 Deepfake
  5. 5 Threat evolution
  6. 6 Identity and encryption
  7. 7 Data encryption
  8. 8 Structure of the solution
  9. 9 Scenario sources
  10. 10 Type of implementation
  11. 11 volumetric transparent encryption
  12. 12 live data transformation
  13. 13 transparent encryption
  14. 14 application layer encryption
  15. 15 hardware appliance
  16. 16 security intelligence
  17. 17 Splunk example
  18. 18 IT infrastructure to cloud
  19. 19 Secure your identity
  20. 20 Credentials
  21. 21 Multifactor authentication
  22. 22 Real life scenarios

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.