Securing Apache Spark Big Data Operations: Threats, Best Practices, and Pragmatic Steps

Securing Apache Spark Big Data Operations: Threats, Best Practices, and Pragmatic Steps

Canonical Ubuntu via YouTube Direct link

Financial vs Espionage

7 of 26

7 of 26

Financial vs Espionage

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing Apache Spark Big Data Operations: Threats, Best Practices, and Pragmatic Steps

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 What is Spark
  4. 4 Security threats to Spark
  5. 5 What does Spark do
  6. 6 Motivations for cyber attacks
  7. 7 Financial vs Espionage
  8. 8 State Sponsored Threats
  9. 9 Insider Attacks
  10. 10 Preventative Control
  11. 11 Threat Modeling
  12. 12 Stride Framework
  13. 13 CNCF
  14. 14 Finding processes that work for the business
  15. 15 Risk Evaluation Framework
  16. 16 Spark Security Features
  17. 17 Data Value
  18. 18 Cloud Providers
  19. 19 Perimeter Access
  20. 20 What should teams do
  21. 21 Business continuity plan
  22. 22 Automation
  23. 23 Cyberkill chain
  24. 24 Managed solutions
  25. 25 Compliance
  26. 26 Closing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.