The Road to Building Defendable Systems

The Road to Building Defendable Systems

Hack In The Box Security Conference via YouTube Direct link

Intro

1 of 36

1 of 36

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

The Road to Building Defendable Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Welcome
  3. 3 Who am I
  4. 4 Attacks are a technical problem
  5. 5 Existing defence measures do not match attacker tactics
  6. 6 Nakatomi space
  7. 7 Who owns cybersecurity
  8. 8 Four pillars of cybersecurity
  9. 9 Most ignored component
  10. 10 Bank statements
  11. 11 App activity statement
  12. 12 Two harmonious mindsets
  13. 13 Transparency
  14. 14 Maturity
  15. 15 Users
  16. 16 Zero Days
  17. 17 Dancing Pigs
  18. 18 Stupid People
  19. 19 User Behaviour
  20. 20 User Maturity
  21. 21 User Maturity Curve
  22. 22 Uninformed Users
  23. 23 Reward Users
  24. 24 Password Composition Guidelines
  25. 25 How many of you use WhatsApp
  26. 26 How do you log into WhatsApp
  27. 27 The big message
  28. 28 Banking customer suggestion
  29. 29 Telegram
  30. 30 Gmail
  31. 31 Take ownership of cybersecurity
  32. 32 Change the mindset
  33. 33 Questions
  34. 34 Political problem
  35. 35 Change the thought process
  36. 36 Look for simple things

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.