Removing the Snake Oil From Your Security Program

Removing the Snake Oil From Your Security Program

via YouTube Direct link

Endpoint Protection

22 of 40

22 of 40

Endpoint Protection

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Removing the Snake Oil From Your Security Program

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Anthony Blakemore
  3. 3 Agenda
  4. 4 Background
  5. 5 Why do attacks keep working
  6. 6 Life cycle of attacks
  7. 7 Network security and monitoring
  8. 8 Firewalls
  9. 9 Visibility
  10. 10 Why IPS fail
  11. 11 Internal traffic
  12. 12 LightCyber
  13. 13 Cold
  14. 14 Patch Management
  15. 15 Standardization
  16. 16 Standardize
  17. 17 Legacy Systems
  18. 18 Sim Products
  19. 19 Commitment to Sim
  20. 20 Sim Failures
  21. 21 Stealth Bits
  22. 22 Endpoint Protection
  23. 23 Breaches
  24. 24 Silence
  25. 25 Cobalt Strike
  26. 26 Wrapup
  27. 27 Questions
  28. 28 When are you going to replace these solutions
  29. 29 Is there a balance
  30. 30 Whitelisting
  31. 31 The Middle of the Road
  32. 32 Patching
  33. 33 Quarantine
  34. 34 Isolation
  35. 35 Solutions
  36. 36 Other Protections
  37. 37 Use Abilities
  38. 38 Find the Pain Point
  39. 39 Set Goals
  40. 40 High Coverage

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.