У нас вы можете посмотреть бесплатно Infosec 2023 Keynote - Why traditional cybersecurity leads to a breach. или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Chad Koslow, CEO of Ridge IT, delivers a hard-hitting keynote at InfoSec 2023 exposing why traditional cybersecurity inevitably leads to breaches. Drawing from 10 years in the intelligence community and DoD, Chad reveals the fatal flaw in "procure, deploy, and pray" security strategies. The brutal truth: You don't know what you don't know. And you definitely don't want to find out during a breach. What you'll learn: ◦ Why 94% of breaches exploit the same fundamental weakness in perimeter security ◦ Real examples of $500K security tools sitting in the "off" position during breaches ◦ How military methodology beats traditional defensive cybersecurity ◦ The shift from reactive monitoring to proactive threat validation ◦ Why automated attack simulation beats red team exercises About Ridge IT: Tampa's #1 ranked MSSP (Inc 5000) protecting 500,000+ users across 160 countries. Military-grade managed IT, endpoint protection, and Zero Trust architecture. 1,000+ Zero Trust implementations with 15-minute response times. Chad Koslow co-founded Ridge IT after building complex enterprise systems for the Department of Defense. Ridge IT has since grown into a global managed cybersecurity firm delivering military-grade protection to commercial and federal organizations. 🔗 Get military-grade protection: Website: ridgeit.com Key Moments: ◦ 0:00 Introduction - Tampa's #1 MSSP takes the stage ◦ 2:33 Why your security program will eventually fail ◦ 5:23 The human element: Your greatest asset and weakness ◦ 9:52 Why Zero Trust isn't the complete answer ◦ 12:32 The destructive attack threat you're not prepared for ◦ 15:40 Learning from military threat validation methodology ◦ 17:37 Automation vs manual red team limitations ◦ 19:45 Ridge IT's humbling validation results ◦ 22:01 Case study: $500K SSL inspection tool turned off ◦ 24:00 Case study: Perfect security program with 0% Windows protection ◦ 26:29 The path forward: Know what you don't know