Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Automating Security Controls Using Models and Security Orchestration

RSA Conference via YouTube

Overview

Explore model-driven security approaches to combat rapidly evolving cyber threats in this 48-minute RSA Conference talk. Discover how organizations can move beyond simple anomaly detection to implement dynamic, automated security controls. Learn about the concept of model-driven security, its applications in dynamic provisioning, and strategies for implementation. Gain insights into identity and access management, security data analytics, and how to leverage data warehouses and rule-based security systems. Examine real-world examples, risk scoring methodologies, and the role of password vaulting and Data Loss Prevention (DLP) in a comprehensive security strategy. Understand the importance of security orchestration, third-party risk management, and performance metrics in building a robust cybersecurity framework. Ideal for security professionals seeking to enhance their organization's ability to respond swiftly and effectively to emerging threats like NotPetya.

Syllabus

Introduction
NotPetya
Model Driven Security
Data Warehouse
RuleBased Security
Example
Risk Scores
Password Vaulting
DLP
Security orchestration
Dynamic provisioning
Not Petya
Models
Questions
ThirdParty Risk
Scoring Base
Performance Management
SIM
Clarification

Taught by

RSA Conference

Reviews

Start your review of Automating Security Controls Using Models and Security Orchestration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.