Главная
Study mode:
on
1
Introduction
2
Shadow IT
3
Mobility
4
The Bermuda Triangle
5
Why PII
6
Ransomware
7
Trusted Partner Attacks
8
The Entire Shift
9
The Defense Has Dissolved
10
Traditional Data Center Connection
11
The Internets New Data Center
12
Split Tunneling
13
Needle in a haystack
14
Antivirus is dead
15
The bad guys are buying legitimate ad space
16
Theyre keeping the cost down
17
Remember Droid Jack
18
Full Access
19
Evolution Ransomware
20
Defense in Depth
21
Behavioral Analysis
22
Questions
23
Three Things
24
Thank You
Description:
Explore the evolving landscape of cybersecurity challenges in this 29-minute conference talk from GrrCon 2016. Delve into critical topics such as Shadow IT, mobility, and the "Bermuda Triangle" of security risks. Examine the increasing importance of protecting personally identifiable information (PII) and the rising threat of ransomware. Analyze the shift in traditional data center connections and the emergence of the internet as the new data center. Discover why antivirus solutions are becoming obsolete and how cybercriminals are adapting their tactics, including the use of legitimate ad space. Learn about the concept of Defense in Depth and the growing significance of behavioral analysis in cybersecurity. Gain valuable insights into the three key things to remember in this rapidly changing digital security environment.

Encryption Mobility Cloud - Oh My

Add to list