Главная
Study mode:
on
1
How do companies know when a cyber event may be happening
2
How do companies respond to cyber events
3
Communication
4
Ransomware
5
Preventing Ransomware
6
Business Email Compromise
7
Email Compromise
8
Number 1 Threat
9
Threat Intelligence
10
Pros and Cons
11
Do you always assume that
12
Summary
Description:
Explore the intricacies of cyber attacks and enterprise protection in this 55-minute conversation led by cybersecurity experts Amy Batallones and Dina Mangialino from NYU. Gain insights into real-world cyber incidents, learn valuable lessons from industry professionals, and discover effective strategies for incident response. Delve into topics such as identifying potential cyber events, corporate response protocols, and the critical role of communication during crises. Examine the growing threat of ransomware, understand prevention techniques, and analyze the impact of business email compromise. Investigate the pros and cons of threat intelligence and challenge your assumptions about cybersecurity. Equip yourself with essential knowledge to safeguard your enterprise against evolving digital threats.

Anatomy of an Attack - Understanding and Protecting Against Cyber Threats

New York University (NYU)
Add to list
0:00 / 0:00