• ClipSaver
  • dtub.ru
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

How to Close the Cybersecurity Skills Gap with a Student Powered SOC скачать в хорошем качестве

How to Close the Cybersecurity Skills Gap with a Student Powered SOC 2 месяца назад

скачать видео

скачать mp3

скачать mp4

поделиться

телефон с камерой

телефон с видео

бесплатно

загрузить,

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
How to Close the Cybersecurity Skills Gap with a Student Powered SOC
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: How to Close the Cybersecurity Skills Gap with a Student Powered SOC в качестве 4k

У нас вы можете посмотреть бесплатно How to Close the Cybersecurity Skills Gap with a Student Powered SOC или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон How to Close the Cybersecurity Skills Gap with a Student Powered SOC в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



How to Close the Cybersecurity Skills Gap with a Student Powered SOC

Summary: Timothy De Block speaks with Bruce Johnson of TekStream about a truly innovative solution to the cybersecurity skills shortage: the Student-Powered Security Operations Center (SOC). Bruce outlines how this three-way public-private partnership not only provides 24-hour threat detection and remediation serves as a robust workforce development program for university students. The conversation dives into the program's unique structure, its 100% placement rate for students, the challenges of AI "hallucinations", and how the program teaches crucial life skills like accountability and critical thinking. The Student-Powered SOC Model • Workforce Development: The program tackles the cybersecurity skills shortage by providing students with practical, real-world experience and helps bridge the gap where new graduates struggle to find jobs due to minimum experience requirements. • Funding Structure: The program is built on a three-way private-public partnership involving the state, educational institutions, and Techstream. The funding for the SOC platform is often separate from the academic funding for student talent building. • "Investment Solution": The model is positioned as an investment rather than an outsourced expense. Institutions own the licenses for their SIM environments and retain built assets, fostering collaborative value building. • Reputational Value: The program provides significant reputational value to schools, boasting a 100% placement rate for students and differentiating them from institutions that only offer academic backgrounds. • Cost Savings: It serves as a cost-saving measure for CISOs, as students are paid an hourly rate to perform security analyst work. Student Training and Impact • Onboarding and Assessment: The formal onboarding process, which includes training on tools, runbooks, and hands-on labs, has been shortened to six weeks. The biggest indicator of a student's success is their critical thinking test, which assesses logical reasoning rather than rote knowledge. • Progression and Mentorship: Students are incrementally matured by starting with low-complexity threats (like IP reputation) and gradually advancing to higher-difficulty topics, including TTPs (Tactics, Techniques, and Procedures), utilizing a complexity scoring system. Integrated career counseling meets regularly with students to review their metrics and guide their career planning. • Metrics and Productivity: The program has proven successful, with students handling 50% of incident volume within a quarter of onboarding, including medium to high complexity threats. • Beyond Cybersecurity: Students gain valuable, transferable life skills, such as collaboration, accountability, professionalism, and "adulting", which helps isolated students become more engaged. AI and the "Expert in the Loop" • Techstream’s Overkill AI: Techstream uses its product, Overkill, for 24-hour threat detection and remediation, automating analysis, prioritization, and the creation of new detections to go "from zero to hero in 24 hours". • Expert Supervision: Their approach is "expert in the loop" , meaning humans (students and analysts) are involved in supervising the AI, with automation being adopted incrementally as trust is built. • The Hallucination Challenge: Timothy De Block raised concern about students lacking the experience to discern incorrect information or "hallucinations" from AI output. Bruce Johnson affirmed that the program trains students in three areas: using AI, supervising AI, and understanding AI broadly. • Training Necessity: Students must learn how to do the traditional level one work before they can effectively supervise an AI, as experience is needed to detect when the AI makes a bad assumption. Support the Podcast: Enjoyed this episode? Leave us a review and share it with your network! Subscribe for more insightful discussions on information security and privacy. Contact Information: Leave a comment below or reach out via the contact form (https://www.exploresec.com/contact) on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn (  / timothy-deblock  ) . Check out our services page (https://www.exploresec.com/services) and reach out if you see any services that fit your needs. Social Media Links: [RSS Feed (http://www.timothydeblock.com/eis?for...) ] [iTunes (https://itunes.apple.com/us/podcast/e...) ] [LinkedIn (  / timothy-deblock  ) ][YouTube (   / @exploresec  ) ]

Comments
  • Exploring the Next Frontier of IAM: Shared Signals and Data Analytics 2 месяца назад
    Exploring the Next Frontier of IAM: Shared Signals and Data Analytics
    Опубликовано: 2 месяца назад
  • How to Build an AI Governance Program with Walter Haydock 3 недели назад
    How to Build an AI Governance Program with Walter Haydock
    Опубликовано: 3 недели назад
  • What is the 2025 State of the API Report From Postman? 3 месяца назад
    What is the 2025 State of the API Report From Postman?
    Опубликовано: 3 месяца назад
  • Exploring Cribl: Sifting Gold from Data Noise for Cost and Security 1 месяц назад
    Exploring Cribl: Sifting Gold from Data Noise for Cost and Security
    Опубликовано: 1 месяц назад
  • Emotion vs. Math: The Mortgage Decision That Changes Everything 6 дней назад
    Emotion vs. Math: The Mortgage Decision That Changes Everything
    Опубликовано: 6 дней назад
  • [RERELEASE] Why communication in infosec is important - Part 2 3 месяца назад
    [RERELEASE] Why communication in infosec is important - Part 2
    Опубликовано: 3 месяца назад
  • Как раскусить любого | 14 хитростей Макиавелли 3 месяца назад
    Как раскусить любого | 14 хитростей Макиавелли
    Опубликовано: 3 месяца назад
  • Закон POSH (О предотвращении сексуальных домогательств) 2013 г. | UPSC IAS 2022 Трансляция закончилась 3 года назад
    Закон POSH (О предотвращении сексуальных домогательств) 2013 г. | UPSC IAS 2022
    Опубликовано: Трансляция закончилась 3 года назад
  • Но что такое нейронная сеть? | Глава 1. Глубокое обучение 8 лет назад
    Но что такое нейронная сеть? | Глава 1. Глубокое обучение
    Опубликовано: 8 лет назад
  • How to Manage Cybersecurity Awareness Month 2 месяца назад
    How to Manage Cybersecurity Awareness Month
    Опубликовано: 2 месяца назад
  • Как Wireshark помог ему пробиться в сферу кибербезопасности 4 дня назад
    Как Wireshark помог ему пробиться в сферу кибербезопасности
    Опубликовано: 4 дня назад
  • [RERELEASE] What is application security? 1 месяц назад
    [RERELEASE] What is application security?
    Опубликовано: 1 месяц назад
  • Музыка для работы - Deep Focus Mix для программирования, кодирования 1 год назад
    Музыка для работы - Deep Focus Mix для программирования, кодирования
    Опубликовано: 1 год назад
  • Наталья Зубаревич: Мы не распадёмся 6 дней назад
    Наталья Зубаревич: Мы не распадёмся
    Опубликовано: 6 дней назад
  • Мир AI-агентов уже наступил. Что меняется прямо сейчас 23 часа назад
    Мир AI-агентов уже наступил. Что меняется прямо сейчас
    Опубликовано: 23 часа назад
  • [RERELEASE] How to make time for a home lab 10 дней назад
    [RERELEASE] How to make time for a home lab
    Опубликовано: 10 дней назад
  • ShowMeCon: Unraveling the Cybersecurity Fabric of Space and SCADA Networks with Paul Coggin 1 год назад
    ShowMeCon: Unraveling the Cybersecurity Fabric of Space and SCADA Networks with Paul Coggin
    Опубликовано: 1 год назад
  • What is BSides ICS? 1 месяц назад
    What is BSides ICS?
    Опубликовано: 1 месяц назад
  • Virtual Live Podcast Recording: What is Security Awareness Month? Трансляция закончилась 4 месяца назад
    Virtual Live Podcast Recording: What is Security Awareness Month?
    Опубликовано: Трансляция закончилась 4 месяца назад
  • Has BRICS given up on challenging Western economic dominance? | The Bottom Line 10 часов назад
    Has BRICS given up on challenging Western economic dominance? | The Bottom Line
    Опубликовано: 10 часов назад

Контактный email для правообладателей: u2beadvert@gmail.com © 2017 - 2026

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5