У нас вы можете посмотреть бесплатно Cyber Resilience Maturity (WWT Research) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Surviving a ransomware attack isn't the same as being resilient. Most organizations are "resilient on paper, fragile in practice." They have backup plans and incident response procedures—until those plans hit a real crisis at 2 AM and fall apart. In this episode, we break down WWT's Cyber Resilience Maturity Model with Madison Horn (WWT's National Security and Infrastructure Advisor) and Rob Joyce (former NSA Cybersecurity Director). We're talking about the difference between reactive recovery and intelligent adaptive resilience—and why that distinction matters when nation-states are pre-positioning inside critical infrastructure. What we cover: Why resilience starts with accepting you will be breached The Colonial Pipeline lesson: they didn't lose control, they lost confidence Identity as the new attack surface (and why it comes first in recovery) Harvest now, decrypt later: what quantum computing means for authentication How AI doesn't just speed up attacks—it eliminates the need for attackers to sleep The five maturity levels that take you from scrambling to intelligent defense The organizations that recovered from NotPetya weren't at maturity level five. They were at three or four. They just understood the basics: identity comes first, dependencies matter, and you practice failure before it happens. Cyber Resilience: Why Security Fails When It Matters Most https://www.wwt.com/video/cyber-resil... WWT 2520