Completed
Cybersecurity Promotions and Job Rotation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
What Cybersecurity Practitioners Can Learn from Honeybees
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Beekeeping and Cybersecurity?!?!
- 3 Agenda
- 4 What's a Bee?
- 5 Similarities Between Beekeeping & Cybersecurity
- 6 Superorganism & Organization: Mission-Driven
- 7 Frames & Frameworks
- 8 Newer Species, New Department
- 9 Threat Actors & Attackers
- 10 What Mission Critical Decisions do Bees Make?
- 11 Bees are Democratic
- 12 How Bees Make Decisions
- 13 Difference of Decision Making Process
- 14 What Cybersecurity Teams Can Do to BEE more like Bee
- 15 Differences Between Beekeeping & Cybersecurity
- 16 Bee Promotions and Job Rotation
- 17 Cybersecurity Promotions and Job Rotation
- 18 Bee Threat Actors
- 19 Varroa Mite
- 20 Third-Party Risk: Listening to a Beekeeper Who Doesn't Know What They're Doing
- 21 Fancy Bears
- 22 Bee Inspector
- 23 Zero Trust & Honeyben
- 24 How cybersecurity teams can be more like bees
- 25 Summary