Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of creating a comprehensive security program in this 33-minute conference talk from Central Ohio Infosec 2015. Delve into the importance of cybersecurity in today's threat landscape, examining the lessons learned from 2014's major security incidents. Gain insights on advanced persistent threats, critical asset protection, and the causes of data breaches across various industries. Learn effective strategies for vulnerability scanning, threat modeling, and incident response planning. Discover how to build a robust security program that transitions from siloed approaches to seamless integration, while also considering the human element in cybersecurity.
Syllabus
Introduction
Why are we here
Cyber security now trumps terrorism
What we saw in 2014
Advanced persistent threats
Critical asset protection
Protecting information assets
Causes of data breaches
Data breaches by industry
Critical infrastructure assets
Vulnerability scanning
How to build a program
Threat modeling
Incident response planning
Humanism