Главная
Study mode:
on
1
Introduction
2
History of Information Security
3
Reusable Passwords
4
Strong Authentication and Encryption
5
Board of Directors
6
What Works
7
The Bottom Line
8
RSA Security
9
Operationalizing Security Tools
10
Security is a Risk Decision
11
Security isnt an Island
12
tabletop exercises
13
Data is key
14
Encryption
15
Encrypting
16
Why Encryption is Bad
17
Threat Model
18
Hold Your Own Key
19
You Use Cloud
20
You Use Public Cloud
21
Control
22
Audience Question
23
First Place to Look
24
Risk Register Framework
25
Whats the best tool set
26
Thoughts on CMMC
27
Thoughts on GDPR
28
The maturity model
29
Jury is still out
30
Twofactor authentication encryption
31
Admin privileged
32
Closeout
33
Outro
Description:
Explore a thought-provoking webcast featuring cybersecurity experts Anton Chuvakin, Ann Johnson, and John Pescatore as they delve into the evolution of information security. Trace the industry's journey from its origins in securing information to the current focus on cybersecurity and network protection. Discover how advancements in identity management and encryption are shifting attention back to data security. Gain insights into addressing modern challenges in securing sensitive information, including discussions on reusable passwords, strong authentication, and the role of encryption. Learn about the importance of board involvement, operational security tools, and risk-based decision-making. Examine the concept of security as a collaborative effort, the significance of tabletop exercises, and the complexities of data protection in cloud environments. Engage with expert opinions on topics such as threat modeling, key management, regulatory frameworks like CMMC and GDPR, and the effectiveness of two-factor authentication and privileged access management. Read more

Remember When We Used to Call It "Information Security"? Let's Go Back to That

RSA Conference
Add to list
0:00 / 0:00