The Information Security profession has become unfocused and untethered from foundational concepts. While companies are trying to digitally transform themselves, they are dazzled by vendors hawking machine‐learning’ and ‘artificial intelligence.’ We trust our most sensitive data and infrastructure to third parties without fully understanding the ‘Shared Responsibility model’ that underpins such a relationship. Meanwhile our networks, applications, servers, and endpoints are compromised because a port was left open. Access controls were not properly maintained and audited. ‘Shadow IT’ has become an even larger issue with the forced remote work of COVID‐19 transitioning into a wider acceptance of remote work in general. Ransomware, social‐engineering, Solar winds, and on and on.
Curriculum
- 1. Introduction & agenda (7:39)
- 2. Overview (4:44)
- 3. What are you Doing Here (11:17)
- 4. Back to Basics - Part 1 (11:35)
- 4. Back to Basics - Part 2 (6:25)
- 4. Back to Basics - Part 3 (14:39)
- 4. Back to Basics - Part 4 (14:14)
- 5. Lets all get scared - Part 1 (10:40)
- 5. Lets all get scared - Part 2 (16:17)
- 5. Lets all get scared - Part 3 (12:34)
- 5. Lets all get scared - Part 4 (11:59)
- 5. Lets all get scared - Part 5 (21:55)
- 6. All people seem to need a Data Protection (25:14)
- 7. Get Ready Hunt & Conclusion (5:12)
Other Courses
Here are a few more courses you may be interested in