Главная
Study mode:
on
1
Introduction
2
The Three Phases of Cybersecurity
3
About Me
4
Attribution is Impossible
5
How do we catch cyber criminals
6
Cyber attribution
7
Nothing worth stealing
8
Critical infrastructure
9
Information sharing
10
Cyber tool proliferation
11
We can solve this problem
12
Offense is easy
13
Speed of light
14
Breach time
15
Preventing everything
16
Outcomedriven metrics
17
Its all hopeless
18
Question
19
Realtime detection
20
Favorite data sources
21
Advice for new cybersecurity professionals
22
GDPR
23
China
24
Cloud security
Description:
Explore the top 10 myths in cybersecurity through this comprehensive lecture delivered by Dmitri Alperovitch at New York University's AIG Cybersecurity series. Delve into crucial topics such as attribution challenges, critical infrastructure protection, information sharing, and the proliferation of cyber tools. Gain insights on breach prevention, outcome-driven metrics, and the importance of real-time detection. Learn about the three phases of cybersecurity, understand the complexities of cyber attribution, and discover why the notion that "nothing is worth stealing" is a dangerous misconception. Examine the challenges of cloud security, the impact of GDPR, and the role of China in the cybersecurity landscape. Benefit from expert advice for aspiring cybersecurity professionals and engage with thought-provoking questions on the future of the field.

Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture

New York University (NYU)
Add to list