У нас вы можете посмотреть бесплатно Zero Trust and Jurassic Park или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Kathleen Noble (Intel, US) Director, PSIRT and Bug Bounty Katie serves as a CVE Program Board, Bug Bounty Community of Interest Board, and Hacking Policy Council member. She is a passionate defensive cybersecurity community activist, she is regularly involved is community driven projects and is most happy when she is able to effect positive progress in cyber defense. In her day-job Katie Noble serves as a Director of PSIRT, Bug Bounty, and the Security Working Artifacts Team at a fortune 50 Technology Company. Prior to joining private sector, Katie spent over 15 years in the US Government. Most recently as the Section Chief of Vulnerability Management and Coordination at the Department of Homeland Security, Cyber and Infrastructure Security Agency (CISA). Her team is credited with the coordination and public disclosure of 20,000+ cybersecurity vulnerabilities within a two-year period. During her government tenure, in roles spanning Intelligence Analyst for the National Intelligence Community to Senior Policy Advisor for White House led National Security Council Cyber programs, Katie’s work directly impacted decision making for government agencies in the United States, United Kingdom, Canada, and Australia. --- Did you think the 1993 film Jurassic Park was a movie about Dinosaurs. It’s not. The Jurassic Park film is a cautionary tale of overreliance on Industrial Control Systems, with clear lack of zerotrust principles across the network. In addition to a lack professional acceptance of Cyber Security and Incent response as a necessary element of any business operations plan. This talk will focus on the many examples of how zerotrust principles should be employed in your and your customers networks and will provide many examples, taken from the film, on the results and consequence of failures. This talk is not meant to change the world or have some great deep meaning. It is meant to be a lighthearted way of familiarizing ourselves with some basic cyber hygiene principals.