36
36
movies
eye 36
favorite 0
comment 0
Cybersecurity in America was one of the second-prize high school west division winners in C-SPAN Classroom's StudentCam documentary contest. Ethan Cranston, a sophomore at Golden View Classical Academy in Golden, Colorado, produced the video. The local cable provider was Comcast. C-SPAN Classroom's StudentCam video documentary contest is an annual national competition in which middle and high school students produce a documentary on a specific theme. The 2017 theme was: "Your Message To...
Topic: cybersecurity
Source: Comcast Cable
142
142
Oct 15, 2020
10/20
by
CyberSecSIG
movies
eye 142
favorite 0
comment 0
Today, October 15 2020 at 12:00 EDT (16:00 UTC) The Internet Society Cybersecurity Special Interest Group (CyberSecSIG) hosts ‘ Why National Cybersecurity Awareness Programmes often Fail ‘. This, the 4th Webinar in the Global Cyber Forum series , as part of Cyber Security Awareness Month , will be presented by Dr Eva Nagyfejeo of the Global Cyber Security Capacity Centre (GCSCC) at Oxford Martin School, and chaired by Dr Enrico Calandro , Co-Director at ...
Topic: cybersecurity
Naval Postgraduate School
77
77
May 2, 2019
05/19
by
Bardwell, Andrew; Buggy, Sean; Walls, Remuis
texts
eye 77
favorite 0
comment 0
Cyber threats are a growing concern for our military, creating a need for cybersecurity education. Current methods used to educate students about cyber, including annual Navy Knowledge Online training, are perceived to be ineffective. The Naval Postgraduate School developed an All hands pilot cybersecurity course with the objective of increasing military officers' cybersecurity awareness. The three of us participated in the ten-week course to assess the delivery of the curriculum. This MBA...
Topics: cybersecurity, cybersecurity education, cyber-curriculum development
280
280
May 19, 2021
05/21
by
ISOC Botswana
movies
eye 280
favorite 0
comment 0
On Tuesday 18 May 2021 the Computer Society of Botswana (CSB) and ISOC Botswana Chapter collaborated to host the ‘ CyberSecurity: Fast-tracking Botswana to Prosperity ‘ Webinar. The webinar invited industry experts to discuss (i) the current cybersecurity situation of Botswana (ii) fast-tracking the implementation of relevant legislation and frameworks. 01 Opening remarks Agang K. Ditlhogo, ISOC Botswana Dr. Audrey Masizana, University of Botswana Benson Motswetla, ISOC Botswana...
Topics: cybersecurity, botswana
28
28
Nov 27, 2021
11/21
by
IoTCiberSecLAC
movies
eye 28
favorite 0
comment 0
Hoy viernes 26 de noviembre 2021 a las 22:00 UTC el grupo Internet de las Cosas y Ciberseguridad para América Latina y el Caribe (IoT CiberSec LAC) presenta un webinar ‘ Seguridad en Internet de las Cosas ‘. El internet de las cosas es una tecnología que posibilita conectar diferentes objetos -como dispositivos electrónicos, electrodomésticos, vehículos autónomos o casas conectadas, entre otros- a internet y a otros dispositivos como teléfonos inteligentes y computadoras....
Topics: Iot, Cybersecurity
18
18
web
eye 18
favorite 0
comment 0
cubistcswashingtonedu_cybersecurity dumped with WikiTeam tools.
Topics: wiki, wikiteam, MediaWiki, cubistcswashingtonedu_cybersecurity,...
27
27
web
eye 27
favorite 0
comment 0
CyberSecurity-ETEC551-Spr2016 dumped with WikiTeam tools.
Topics: wiki, wikiteam, wikispaces, CyberSecurity-ETEC551-Spr2016, cybersecurity-etec551-spr2016,...
76
76
Apr 24, 2020
04/20
by
NSA
texts
eye 76
favorite 2
comment 0
Topics: cybersecurity, security, malware
96
96
Oct 2, 2020
10/20
by
ISOC NY
image
eye 96
favorite 0
comment 0
Today, Friday 11 October 2020 at 11am EDT (15:00 UTC) the Internet Society NY Chapter (ISOC-NY) presents a webcast of the VPN Trust Initiative (VTI) Principles Launch , held on September 24. The VPN Trust Initiative (VTI) is a consortium of leading VPN providers focused on improving digital safety for consumers by building understanding, strengthening trust, and mitigating risk for VPN users. The principles offer a set of best practices for VPN providers to bolster...
Topics: VPN, trust, cybersecurity
New encryption methods and blockchain technology may assist with cybersecurity. On this episode, Larry Castro discussed advances in cybersecurity.
Topics: cybersecurity, computers, groks
Source: Groks Science Radio Show and Podcast
3
3.0
movies
eye 3
favorite 0
comment 0
Series/Special. An update on an order established to increase communication among agencies to reduce the risk of cybersecurity. New.
Topics: Cybersecurity, Television Program
Source: Comcast Cable
18
18
Oct 24, 2021
10/21
by
https://isoc.live/14667/
movies
eye 18
favorite 0
comment 0
On Thursday October 21 2021 from 14:00-18:30 CEST (12:00-16:30 UTC) Encryption Europe celebrates the first Global Encryption Day with three interactive webinars . Roundtable 1: “From IoT to Quantum, why encryption will matter” Vincent Rijmen , KU Leuven / co-inventor of AES Péter Budai , VP Product, Tresorit Olivier Croi x, Head, Crypto Group, Thales Belgium Ludovic Perret , Paris Sorbonne / co-founder, CryptoNext Moderator – Pascal Steichen , CEO, SECURITYMADEIN.LU...
Topics: encryption, europe, cybersecurity
24
24
Oct 21, 2020
10/20
by
CyberSecSig
movies
eye 24
favorite 0
comment 0
Today, October 21 2020 at 11:00 EDT (14:00 UTC) the Internet Society Cybersecurity Special Interest Group (CyberSecSIG) hosts the 6th Webinar in the Global Cyber Forum series, as part of Cybersecurity Awareness Month, with the theme 'ICybersecurity: Risks, Progress, and the way forward in Latin America and the Caribbean- A Caribbean focus'. SPEAKER: Kerry-Ann Barrett – Organization of American States MODERATOR Niel Harper – UNOPS LIVESTREAM...
Topics: cybersecurity, caribbean, oas
117
117
Oct 29, 2020
10/20
by
picisoc
movies
eye 117
favorite 0
comment 0
On Thursday 29 October at 7pm FJT (07:00 UTC) the Internet Society Pacific Islands Chapter (PICISOC) hosts an ‘ E-Talanoa ‘ webinar ‘ Cyber Security During and Post COVID19 Crisis ‘. Talanoa is a traditional word used in Fiji and across the Pacific to reflect a process of inclusive, participatory and transparent dialogue. PANEL Anne Dunn-Baleilevuka , Commissioner, Online Safety Commission (OSC) Torrin Marquardt , International Engagement Manager, Standards Australia Suetena...
Topics: oceania, cybersecurity, fiji
5
5.0
May 17, 2021
05/21
by
Israel ישראל
movies
eye 5
favorite 0
comment 0
These Israeli technologies, showcased at CyberTech in Tel Aviv, are taking #cybersecurity to the next level:💻 https://t.co/dkM1UPgBxM Source: https://twitter.com/Israel/status/879704353371676672 Uploader: Israel ישראל
Topics: Twitter, video, cybersecurity
Are your internet-connected home devices someday going to turn against you? Today we're talking about botnets and their role in compromising the Internet of Things, and just how much you need to worry about it.Unit 42 Threat Researcher, Ryan Olson, is joined in the studio by Rick Howard, Chief Security Officer at Palo Alto Networks for another season of their \"Don't Panic\" podcast, where they break down the components of large scale cyber security attacks and tell you why you don't...
Topics: Podcast, securitycybersecuritythreatintelligenceunit42threatresearchtechnology, cybersecurity
10
10.0
movies
eye 10
favorite 0
comment 0
President Obama delivers remarks to the Illinois State Assembly nine years to the day that he announced his candidacy for the presidency
Topics: north korea, cybersecurity
Source: Comcast Cable
29
29
movies
eye 29
favorite 0
comment 0
[LIVE] The National Press Club hosts a panel discussion with global corporate representatives on cybersecurity. Sponsor: National Press Club | Newsmaker
Topics: danny, kristin, cybersecurity
Source: Comcast Cable
18
18
movies
eye 18
favorite 0
comment 0
Panelists discuss progress being made to protect public and private cyber networks.
Topics: cyberspace, cybersecurity, washington
Source: Comcast Cable
1
1.0
May 18, 2021
05/21
by
PM of Israel
movies
eye 1
favorite 0
comment 0
Prime Minister Netanyahu, at the @CyberWeekconf #CyberSecurity conference today at @TelAvivUni: "We have unbelievable opportunities and we’re realizing them and at the same time we have unbelievable challenges and we must confront them." https://t.co/G1AMHYJ91j Source: https://twitter.com/IsraeliPM/status/1009389904005095424 Uploader: PM of Israel
Topics: Twitter, video, CyberSecurity
In the last decade, the integration of unmanned aerial systems (UAS) into military operations has grown substantially. UAS have significantly contributed to U.S. military tactical, operational and strategic operations. Recently, the U.S. military has made increasing use of commercial off-the-shelf (COTS) UAS, yet none of the U.S. military services have a defined cybersecurity risk management process for COTS UAS. These systems have been susceptible to cyber attacks, leading to the May 2018 ban...
Topic: cybersecurity risk management
56
56
movies
eye 56
favorite 0
comment 0
Public affairs events, congressional hearings, speeches, and interviews
Topics: far as cybersecurity, c-span, russia, ioc, cybersecurity, steve irwin
Source: Comcast Cable
82
82
movies
eye 82
favorite 0
comment 0
Topics: dhs, scott, cybersecurity, deloitte, eric, cybersecurity, ransomware, europe, kiersten, brussels
Source: Comcast Cable
With remote workforces accelerating digital transformation, security teams are shifting their mindset from controlling assets to managing access. This is not easy, especially in a cloud-first world where ease of install and free trials reign supreme. In episode #2 of the HIP Podcast, Ben Johnson, CTO and co-founder of Obsidian Security, discusses the new access-related problems that organizations face during COVID-19 and beyond.
Topics: Podcast, cybersecurity, identitymanagement, informationsecuritycloudcybersecurity
Sean is joined by Microsoft Cloud Solution Architect, Roelf Zomerman, to discuss the user benefits of having both on-premises + cloud apps in one portal and the different ways you can integrate your legacy on-premises applications with identity services such as Azure AD and Okta.Hosted by 15-time Microsoft MVP Sean Deuby.For more from Roelf, watch his session from the Hybrid Identity Protection conference: http://bit.ly/3e6gEeW.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
Sean is joined by Alexandra Weaver (Semperis Solutions Architect) to discuss Active Directory forest recovery in the context of a comprehensive Business Continuity and Disaster Recovery (BCDR) strategy, including how to identify gaps in the plan. For example, do you have a tested plan in place to bring systems online when no DC is available? Listen in for tips on how to cover common AD recovery gaps.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
What's the worst time to plan for a cyberattack? When you're actively under attack. Sean talks with Ben Cauwel, Senior AD Security Delivery Manager at Accenture France, about putting together a functional, tested incident response plan for before, during, and after a cyberattack. The key is to use the time when the systems are running properly to plan for the worst.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
How have identity security practices changed in the last year? Sean chats with Julie Smith, executive director of the Identity Defined Security Alliance (IDSA), about the organization's newly released \"2021 Trends in Securing Digital Identities\" report. In addition to tracking the increase in managing remote workers and assets during the pandemic, the report captures the rising concern among IT and security teams about whether current security strategies are equipped to meet the...
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
How do we prove who (or what) we are when accessing accounts in the age of multiple cloud services? Passwords are \"a nightmare,\" says John Craddock, longtime Microsoft MVP and IT infrastructure and security analyst with XTSeminars Ltd. Ahead of his HIP Europe Keynote session, Craddock chats with Sean about using Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) with relying parties to break the repetitious cycle of re-entering user IDs and passwords among siloed...
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who's calling the shots on when to bring the network offline for remediation efforts? Especially in multinational organizations, the decision-making process for cyberattack incident response isn't always clearly defined. Any confusion about who makes critical decisions will hinder a fast response. As a follow-on to a previous HIP Podcast session about developing a technical...
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
Today's guest on The HIP Podcast is Microsoft Cloud Specialist, Allen Brokken. As an expert in leveraging hybrid cloud techniques, Allen shares the right way to deal with admin accounts in your cloud service and how a phone call to the security operations center may be the best way to secure your global administrator accounts.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurityhybridcloudcybersecurity
In times of rapid change, security tends to take a back seat. And good hackers never waste a crisis. So, how are the pros managing remote access security risks during COVID-19? Tune into HIP Podcast episode #3 featuring leading white hat Active Directory security expert, Sean Metcalf.Articles Mentioned:• How to: Block legacy authentication to Azure AD with Conditional Access: https://bit.ly/2LQPbyx• Ransomware groups continue to target healthcare, critical services: https://bit.ly/2VMTjW7
Topics: Podcast, cybersecurity, identitymanagement, informationsecuritycybersecurity
Sean talks with Alexander Benoit, CEO of dinext pi-sec, about how Microsoft security offerings have changed with the company's adoption of the extended detection and response (XDR) approach. Benoit, who has a deep understanding of Microsoft infrastructures, breaks down the Microsoft 365 Defender suite and gives his perspective on Microsoft positioning itself as a security company.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
Are passwords really dead? Tune in to this lively conversation among some of the leading luminaries of identity and access management as they debate challenges and solutions of managing access to systems and data in an escalating threat landscape. Moderated by Semperis Chief Architect Gil Kirkpatrick, \"The Future of Identity\" includes perspectives from John Craddock. Pam Dingle, Ulf Simon-Weidner, Guido Grillenmeier, and Ben Cauwel.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
In today's world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as possible is real, but there are significant risks if your recovery simply restores the malware of the original breach. This episode of the HIP Podcast provides real-world, actionable guidance on the right way to recover from Yishai Gerstle, Semperis Security Product Manager, based on his years of incident response, breach prevention, and security solution development.
Topics: Podcast, Cybersecurity, identitymanagement, informationsecurity
In this excerpt from a web seminar, Sean and Michele Crockett (Semperis Senior Director of Product Marketing) dive into the tight link between Exchange Server and Active Directory (and how to guard against attacks like the Hafnium breach), the resurgence of wiper attacks like MeteorExpress that cripple business operations, and the Kaseya attacks that exploited automatic product updates.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
The recents events linked to terrorism have renewed the debate on balancing individual privacy and public security. On this program, Michael Kearns discusses algorithms that could ensure privacy while maintaining public security, as well as how these frameworks differ from cyber-encryption.
Topics: cybersecurity, privacy, counterterrorism, noise
Source: Groks Science Radio Show Podcast
291
291
Oct 6, 2020
10/20
by
ISOC LIVE
movies
eye 291
favorite 1
comment 0
This week the 10th International Cybersecurity Symposium , hosted by Keio University & The MITRE Corporation, takes place with the overall theme. ‘ Building Global Trust for Cyber-Deterrence During an Uncontrolled Pandemic ‘. Today, Tuesday October 6 2020 , at 11:20 UTC (07:20 EDT | 20:20 JST) the #1 Plenary Panel ‘ Building Cyber Norms ‘ will be webcast live via ISOC.LIVE . Panelists : Greg Rattray (Senior Research Professor, Columbia University) Joshua W. Walker...
Topics: cybersecurity, cybernorms, cyber norms
In this session, Sean Deuby discusses third-party security risks with Heinrich Smit, Semperis Deputy CISO, whose extensive experience includes developing and implementing end-to-end security solutions for large financial organizations. Smit offers a global perspective on supply-chain dynamics and practical tips for protecting your organization from potential risks associated with third-party vendors.
Topics: Podcast, Cybersecurity, identitymanagement, informationsecurity
44
44
May 8, 2019
05/19
by
Ryan Prior
movies
eye 44
favorite 0
comment 0
Talk given at libreplanet 2019 with slides. LibrePlanet is the Free Software Foundation's annual conference. The FSF campaigns for free/libre software, meaning it respects users' freedom and community. We believe that users are entitled to this; all software should be free. https://media.libreplanet.org/u/libreplanet/m/security-by-and-for-free-software/
Topics: Libreplanet, cybersecurity, free software
While companies face the advent of widespread ransomware attacks, they must be well prepared with readied crisis management planning. A cybersecurity solutions visionary, a technical evangelist, and a few Microsoft MVP's join forces in this episode to discuss that and more.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications can run is often a difficult process, full of holes and unforeseen vulnerabilities. In this episode of the HIP Podcast, Sean Deuby (Semperis Director of Services) and Alan Sugano, President, ADS Consulting Group, discuss how to develop a successful strategy for designating allowed applications to increase security and dramatically reduce...
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
What has changed about Active Directory disaster recovery since Gil Kirkpatrick and Guido Grillenmeier-aka the \"Masters of Disaster\"-first wrote the book on how to recover AD from scratch in \"The Definitive Guide to Active Directory Disaster Recovery\"? In this session, Sean Deuby leads a discussion with Kirkpatrick and Grillenmeier about the monumental changes in the DR landscape with the onslaught of cyberattacks that target Active Directory, which has exponentially...
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
In this episode, Sean is joined by Doug Davis (Semperis Senior Product Manager) and Rod Trent (Microsoft Security Cloud Solution Architect and Global Azure Sentinel SME) for a deep dive on Azure Sentinel, the Microsoft cloud-native security information and event manager (SIEM). Sentinel is used to monitor and analyze a variety of environments: Listen in for tips on how Sentinel can help strengthen your identity system security posture.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
Tune in as Sean Deuby is joined by Guido Grillenmeier (Semperis Chief Technologist) to discuss the European debut of the award-winning Hybrid Identity Protection conference, a virtual event on June 30 and July 1 that will feature headliners Tony Redmond and John Craddock, as well as Pam Dingle (Microsoft Directory of Identity Services), Jan de Clercq (Distinguished Technologist at HPE), and Alex Benoit (CEO of Dinext, Pi-sec GmbH).Register to attend HIP Europe at https://bit.ly/2SM7Geo.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
Unit 42 leaders Ryan Olson and Rick Howard break down the big issues in cyber security and tell you why you don't need to panic.It may sound like one of the newest shells you can fire at other players in Mario Kart, but PowerShell is actually the command line shell in the modern version of windows. This episode details the development of PowerShell and the new wave of attacks utilizing this administrative tool.
Topics: Podcast, securitycybersecuritythreatintelligenceunit42threatresearchpowershell, cybersecurity,...
In this session, Sean Deuby talks with Orin Thomas, Microsoft Principal Cloud Advocate, about this phenomenon (which he calls the \"COBOL challenge\"), how IT pros can beef up their Active Directory skills, and a preview of the forthcoming Microsoft Windows Server Hybrid Administrator Associate certification.
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
32
32
movies
eye 32
favorite 0
comment 0
Panelists discuss businesses' approaches to cybersecurity.
Topics: mastercard, cybersecurity, idaho, nist
Source: Comcast Cable
In a cloud environment, securing privileged identities and DevOps pipelines with privileged access requires special attention. In this session, Sean Deuby and Gil Kirkpatrick (Semperis Chief Architect) discuss Microsoft's current guidance for securing privileged access in Microsoft Azure with Thomas Naunheim (Cloud Architect at glueckkanja-gab AG).
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity
What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) and Brian Desmond (Principal of Ravenswood Technology Group) share tips for five actions you can take now to significantly improve your security posture: 1) implement good identity processes, 2) ensure that trust settings are reviewed to close security gaps, especially in environments with mergers and acquisitions, 3) plan and test your AD backup...
Topics: Podcast, cybersecurity, identitymanagement, informationsecurity