• Type:

Cyber Security

CH Ask The Cybersecurity Expert Podcast | Cybersecurity Insights #23

In this special Cybersecurity Insights podcast, Josh answers questions about everything from Black Mirror to the definition of resilience.

Q1 | 00:33 | Mac11_59 asked about using blockchain in elections
Using new technologies like blockchain in voting systems relies on having an authoritative identifier. Once government officials are able to validate votes and eliminate the risk of vote tampering, digital innovation in elections will accelerate.

Q2 | 01:36 | Classic_Aspect asked about the cybersecurity skills gap
Organizations need to widen their pool of talent, such as hiring more women. They should also be automating as much as possible so that humans can focus on higher-level, decision making responsibilities.

Q3 | 02:55 | Japneets asked about the future of IoT
Every IoT device has different requirements for firmware, software, recording apps, and telemetry protocols. The industry needs to undergo a process of normalization, where devices are recognized as computers and corresponding security measures are imposed.

Q4 | 04:19 | Marcom_25Z asked about cybersecurity frameworks
Core standards like NIST CSF, CIS Top 20 Critical Controls, and ISO are important for getting started. Once a framework is in place, it’s much easier to implement the measures you need to reach total resilience.

Q5 | 05:29 | Livlovbee asked how to begin a career in cybersecurity
Start by understanding what characterizes an authentic secure environment. What goes into a policy and configuration? What elements go into making a system resilient? This makes detecting when things go wrong much easier.

Q6 | 07:09 | Dbuster asked if certified employees are flight risks
Not investing in professional development is also a flight risk. Companies need employees with certifications like CEH, CISSP, and CISM to stay ahead and the majority of employees will stick around – out of appreciation if nothing else.

Q7 | 08:14 | BlackCall asked whether Black Mirror is realistic
To some extent! The topics covered by Black Mirror provoke our thinking and they should encourage cybersecurity professionals to discuss how to deal with increasing digitization. Even online, we need to respect rights like the protection of privacy and identity.

Q8 | 10:39 | SB8791 asked about encryption
Encryption is a foundational control for data protection. It is an act of obfuscation, restricting access unless a key is present. It keeps the unauthorized out and maintains the data security principle: confidentiality, integrity, and availability.

Q9 | 12:54 | RainbowDeer36 asked about security standards
Regulatory bodies like CSPA in California and GDPR in Europe have imposed standards that need to be met. Beyond those, choose one of the core frameworks and look for an industry-specific version.

Q10 | 14:03 | FunkyTurkey asked about risks, vulnerabilities, and threats
Risk is the quantitive measure of the probability of harm. A vulnerability is about the subject and its susceptibility to harm based on identity. Threats are external elements that can enter a system and compromise it.

Q11 | 16:29 | SamEra asked about resilience
Resilience is the ability to bounce back from setbacks, compromises or failures. Failure is inevitable and resilience is about overcoming the natural slide into disorder. Resilient security controls can self-heal to restore what was there before – without human intervention.

Learn more about cyber resilience: https://www.absolute.com?utm_medium=video&utm_source=youtube&utm_campaign=evc


Watch more of the Cybersecurity Insights series:
#15 – Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: https://www.youtube.com/watch?v=aOy9SQxnHKA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#16 – Zombie Computers, Botnets, and Denial of Service Attacks Explained https://www.youtube.com/watch?v=r-PRBdsEQZA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#17 – Zero Trust Explained: https://www.youtube.com/watch?v=7Oeo1A5gncQ&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#18 – 5 Most Devastating Cyber Attacks: https://www.youtube.com/watch?v=IJc3viPKXk4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#19 – Dealing with IT Complexity: https://www.youtube.com/watch?v=6kvas8uqMuk&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#20 – Cybersecurity Skills Gap: https://www.youtube.com/watch?v=h1u-Inoh96Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#21 – Asset Management – CMDB Reporting vs Asset Intelligence: https://www.youtube.com/watch?v=MRPh3NZRE-k&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#22 – K-12 Education 1:1 Program: https://www.youtube.com/watch?v=plA0fPyhAmc&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1

CH Cyber Resilience: Part 1 – What is Cyber Resilience

Part one of our six-part series on Cyber Resilience introduces you to what cyber resilience is and why it is important. Download our FREE green paper ‘An introduction to implementing Cyber Resilience’ here: https://www.itgovernance.co.uk/an-introduction-to-implementing-cyber-resilience

CH Medical Device Cybersecurity in Healthcare: Managing Threats and Costs

The Vizient Supply Chain Leadership Series explores how hospitals can work with medical device vendors to develop cybersecurity program with effective security controls. With cyber attacks targeting a whopping 95% of health care organizations, medical devices offer access and control to would-be attackers, putting patients at great risk, at huge costs to the organization itself.

Next video info: vizientinc.com/Events/2019-05-15-Supply-Chain-Leadership-Series

Features Erick Decker, chief security and privacy officer, University of Chicago Medicine, Greg Garcia, executive director for Cybersecurity, Healthcare Sector Coordinating Council, Kevin McDonald, director, Clinical Information Security, Mayo Clinic and Molly Zmuda, senior networks director at Vizient, Inc.


CH How Much Math Do You Need to Know in Cybersecurity?

A common question asked around cybersecurity community is how much math is required for a career in this field. Often times this question is asked for students who are enrolling in formal college degree curriculums, having to complete basic math classes before entering the cybersecurity specific classes. Today I address this question head-on, outlining the classes you will likely see in a college degree maps.

If you are not pursuing a formal degree, you will still be able to understand the different security positions and the “math” demands each one requires (as outlined in the video).

Need Help? Visit: https://www.cyberinternacademy.com

Want to Follow Me?:
Twitter: @collinsinfosec
Sign up for the email list: https://youtu.be/FfmAHYqa314

Have questions, concerns, comments? Contact me, grant@cyberinternacademy.com

CH How to start your Career in Cyber Security ?

Web Application Pentesting in Hindi 2018

Lesson 1: https://youtu.be/PrnlLb8giXg
Lesson 2: https://youtu.be/Mqo8XUCSQko
Lesson 3: https://youtu.be/Wl0PrIeAnhs
Lesson 4: https://youtu.be/e6JFtcFn1go
Lesson 5: https://youtu.be/IV4DWwsbRkg
Lesson 6: https://youtu.be/9LpZ9WAjLz0

Networking For Beginners 2018

Lesson 1: https://youtu.be/YQfx7KmteJI
Lesson 2: https://youtu.be/IOAWWoZcW_0


Video 1: https://youtu.be/ZSCqdt6EqWw

Hardware Hacking in Hindi 2018

Video 1: https://youtu.be/dIKKRZZtHFI

Facebook ► https://facebook.com/cleverrhacker
Instagram ► https://www.instagram.com/cleverhacker
Twitter ► https://twitter.com/clever_hacker

#EthicalHacking #CyberSecurity #AskCleverHacker

Cyber Security Salaries REVEALED!

I go through a bunch of different cyber security jobs and their salaries.

Got a question? Drop it in the comments below!
Hit subscribe to stay up to date with the latest news in CyberSecurity

My Website – https://www.cybersecguidance.com
My Twitter – https://www.twitter.com/dcdavidlee
Discord Channel: https://discord.gg/FxUkQsv

Please watch: “A Day In The Life Of A Cyber Security Specialist (Government Contractor)”


Incident Response | Cyber Security Crash Course

When a security breach hits an organization, panicking or downplaying the incident are common and very human reactions. With the right expertise and enough practice, you can keep your business running despite cyber incidents. Watch this video to learn about the risks related to security breaches, and how you can prepare for cyber incidents. Also, don’t miss the incident response case study from the Ministry for Foreign Affairs of Finland!

Read more about incident response: https://blog.f-secure.com/5-steps-to-better-incident-management/

The Cynet 360 Holistic Security Platform

Meet Cynet 360 holistic security platform. Visit: www.cynet.com

CSS2017 Session 7 SANS Training – Incident Handling Process

Session 7: SANS Session – Incident Response: 7 phases of IR – have a plan.
Speaker: Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS

Description: One of the most important phases of an Incident Response is having a plan. Let’s work through the scenario when something strange is happening on our network. What do we do? If we have established a plan of time, we will move to resolution much faster.
Brian Ventura, Information Security Architect and SANS instructor will discuss the phases of Incident Response in detail. Brian brings a wealth of experience in information security and will provide examples of how plans and solutions.

Intended Audience: Information Security Officers, Information Security practitioners, Information Technology practitioners
This video was filmed at the September 21, 2017 Cyber Security Symposium held in San Jose CA

If you would like information on any future PSP Forums, please visit our event site at www.pspinfo.us

Contact Information:
Russ Hicks, President
Public Sector Partners, Inc.

Scroll to top