Making Security Automation Real

Making Security Automation Real

RSA Conference via YouTube Direct link

RSAConference 2019 San Francisco March 4-8 Moscone Center

1 of 16

1 of 16

RSAConference 2019 San Francisco March 4-8 Moscone Center

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Making Security Automation Real

Automatically move to the next video in the Classroom when playback concludes

  1. 1 RSAConference 2019 San Francisco March 4-8 Moscone Center
  2. 2 Attacks Cause Collateral Damage
  3. 3 CIS Top 20
  4. 4 Security Automation in Three Simple Steps
  5. 5 How can we perform these steps?
  6. 6 What is an Endpoint?
  7. 7 Use SWID Tags to identify Software
  8. 8 Correlate Device Identities
  9. 9 Proposal #1: Collect Event-Driven Posture
  10. 10 Vulnerability Discovery, Exploitation and Remediation
  11. 11 ROLIE and its Use Cases
  12. 12 Leverage vulnerability information
  13. 13 Vulnerability Information and Supply Chain Risk Management
  14. 14 Vulnerability Management on the Network
  15. 15 Apply What You Have Learned Today
  16. 16 Security Content Automation Protocol (SCAP) 2.0 Update

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.