Главная
Study mode:
on
1
Intro
2
ABOUT ME - JOEY / LOSTKNOWLEDGE
3
SHAMELESS PLUGGING
4
DISCLAIMER - PART TWO
5
MY DEFINITION OF BUZZWORD
6
IS BUZZWORD A BUZZWORD?
7
DEFINITIONS
8
ORIGINS OF CYBER
9
CURRENT TERMINOLOGY
10
ADVANCED PERSISTENT THREAT
11
BECAME A NEW MARKETING TERM
12
CLOUD COMPUTING
13
WHAT IS IT?
14
WHAT DOES YOUR CLOUD LOOK LIKE?
15
WHAT ARE THINGS?
16
SOCIAL ENGINEERING
17
PEOPLE WILL ALWAYS CLICK ON SOMETHING
18
SE TRAINING IS CRAP
19
SALESMEN
20
EDUCATION
21
BRING ME SOLUTIONS, NOT PROBLEMS
22
WHAT YOU SHOULD NOT DO
23
WHAT YOU SHOULD DO
24
WHAT YOU CAN DO
25
SUMMARY
26
QUESTIONS
27
CONTACT INFO
28
HACKERS?
29
DAVE KENNEDY IS OLAF
Description:
Explore advanced persistent threats, cloud computing, and the Internet of Things in this 49-minute conference talk from Derbycon 2015. Delve into cybersecurity buzzwords, their origins, and current terminology. Learn about cloud computing concepts, the nature of "things" in IoT, and the challenges of social engineering. Gain insights on effective approaches to cybersecurity, including what to avoid and what strategies to implement. Conclude with a summary, Q&A session, and contact information for further discussion on these critical topics in the evolving landscape of cyber threats and defenses.

APT Cyber Cloud of the Internet of Things

Add to list