Insights from NSA’s Cybersecurity Threat Operations Center

Insights from NSA’s Cybersecurity Threat Operations Center

RSA Conference via YouTube Direct link

Technical controls and user vigilance

18 of 29

18 of 29

Technical controls and user vigilance

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Insights from NSA’s Cybersecurity Threat Operations Center

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 NSAs missions
  3. 3 Cyber security operations
  4. 4 Operations center functions
  5. 5 Primary mission
  6. 6 Disruptive events
  7. 7 Russia
  8. 8 Key trends
  9. 9 Effective partnerships
  10. 10 Top 5 Principles
  11. 11 Establish a Defendable Perimeter
  12. 12 harden to best practices
  13. 13 challenge your teams
  14. 14 Pyramid of pain
  15. 15 Business decision
  16. 16 Working with vendors
  17. 17 User vigilance
  18. 18 Technical controls and user vigilance
  19. 19 False flagging
  20. 20 False flagging isnt a new phenomenon
  21. 21 NSAs deductive approach
  22. 22 NSAs structure
  23. 23 US Cyber Command
  24. 24 Sharing information
  25. 25 IOT devices
  26. 26 NIST
  27. 27 Machine Learning
  28. 28 UK Model
  29. 29 Challenges

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.