Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Remember When We Used to Call It "Information Security"? Let's Go Back to That

RSA Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a thought-provoking webcast featuring cybersecurity experts Anton Chuvakin, Ann Johnson, and John Pescatore as they delve into the evolution of information security. Trace the industry's journey from its origins in securing information to the current focus on cybersecurity and network protection. Discover how advancements in identity management and encryption are shifting attention back to data security. Gain insights into addressing modern challenges in securing sensitive information, including discussions on reusable passwords, strong authentication, and the role of encryption. Learn about the importance of board involvement, operational security tools, and risk-based decision-making. Examine the concept of security as a collaborative effort, the significance of tabletop exercises, and the complexities of data protection in cloud environments. Engage with expert opinions on topics such as threat modeling, key management, regulatory frameworks like CMMC and GDPR, and the effectiveness of two-factor authentication and privileged access management.

Syllabus

Introduction
History of Information Security
Reusable Passwords
Strong Authentication and Encryption
Board of Directors
What Works
The Bottom Line
RSA Security
Operationalizing Security Tools
Security is a Risk Decision
Security isnt an Island
tabletop exercises
Data is key
Encryption
Encrypting
Why Encryption is Bad
Threat Model
Hold Your Own Key
You Use Cloud
You Use Public Cloud
Control
Audience Question
First Place to Look
Risk Register Framework
Whats the best tool set
Thoughts on CMMC
Thoughts on GDPR
The maturity model
Jury is still out
Twofactor authentication encryption
Admin privileged
Closeout
Outro

Taught by

RSA Conference

Reviews

Start your review of Remember When We Used to Call It "Information Security"? Let's Go Back to That

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.