Completed
Proposal #1: Collect Event-Driven Posture
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Making Security Automation Real
Automatically move to the next video in the Classroom when playback concludes
- 1 RSAConference 2019 San Francisco March 4-8 Moscone Center
- 2 Attacks Cause Collateral Damage
- 3 CIS Top 20
- 4 Security Automation in Three Simple Steps
- 5 How can we perform these steps?
- 6 What is an Endpoint?
- 7 Use SWID Tags to identify Software
- 8 Correlate Device Identities
- 9 Proposal #1: Collect Event-Driven Posture
- 10 Vulnerability Discovery, Exploitation and Remediation
- 11 ROLIE and its Use Cases
- 12 Leverage vulnerability information
- 13 Vulnerability Information and Supply Chain Risk Management
- 14 Vulnerability Management on the Network
- 15 Apply What You Have Learned Today
- 16 Security Content Automation Protocol (SCAP) 2.0 Update