Главная
Study mode:
on
1
Introduction
2
Who is Telus
3
What is IT security
4
Deepfake
5
Threat evolution
6
Identity and encryption
7
Data encryption
8
Structure of the solution
9
Scenario sources
10
Type of implementation
11
volumetric transparent encryption
12
live data transformation
13
transparent encryption
14
application layer encryption
15
hardware appliance
16
security intelligence
17
Splunk example
18
IT infrastructure to cloud
19
Secure your identity
20
Credentials
21
Multifactor authentication
22
Real life scenarios
Description:
Explore a conference talk from DefCamp #10 on leveraging cloud adoption to enhance IT security and user convenience. Delve into topics such as deepfakes, threat evolution, identity and encryption, data protection strategies, and cloud migration. Learn about various implementation types, including volumetric transparent encryption, live data transformation, and application layer encryption. Discover how to secure identities, implement multifactor authentication, and apply these concepts to real-life scenarios. Gain insights from Telus' experience and explore practical examples using tools like Splunk for security intelligence.

How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10

DefCamp
Add to list
0:00 / 0:00