Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture
New York University (NYU) via YouTube
Overview
Syllabus
Introduction
The Three Phases of Cybersecurity
About Me
Attribution is Impossible
How do we catch cyber criminals
Cyber attribution
Nothing worth stealing
Critical infrastructure
Information sharing
Cyber tool proliferation
We can solve this problem
Offense is easy
Speed of light
Breach time
Preventing everything
Outcomedriven metrics
Its all hopeless
Question
Realtime detection
Favorite data sources
Advice for new cybersecurity professionals
GDPR
China
Cloud security
Taught by
NYU Tandon School of Engineering