Cybersecurity and Zero Trust

preview_player
Показать описание

With cyber attacks becoming ever more sophisticated, cyber security has become a very hot topic.
In this video, Bob Kalka explains three major trends in cybersecurity today: zero trust, threat management, and modernization.

Chapters
0:00 - Intro
0:15 - Zero Trust
3:14 - Identity Governance
3:31 - Identity Analytics
3:48 - Privileged Account Management
4:21 - Access Management
4:33 - Adaptive Authentication
5:54 - Discovery & Classification
6:08 - Encryption
6:17 - Data & File Activity Monitoring
6:33 - Key Management
7:22 - Data Risk Insights
7:49 - Transactional Fraud
7:54 - Configuration Management
9:20 - Threat Management
14:30 - Modernization
16:05 - A Federated Approach
17:39 - Conclusion

#CyberSecurity #ZeroTrust #IBMSecurity
Рекомендации по теме
Комментарии
Автор

No non-sense, buzzwords, or even hype in this video... Just pure and simple theory . Thanks, guys.

lucasdealmeidacarotta
Автор

Great talk Mr Bob Kalka! 18 minutes of pure gold 👌🏽

diegohernanmaza
Автор

Bob is a great presenter! He held my concentration from 0-17:58. Great points and to the point. Great Job Bob!

davidjkelly
Автор

Studying this topic now and this is the most in depth and clear short video I've seen on the subject, this is great thanks

Artanis
Автор

Absolute gold!, I haven't seen or watched a better cybersecurity video on youtube yet (period).

oldsport-gaming
Автор

Absolutely well done! To the point and informative!

MarsCityRadio
Автор

Very interesting and relevant information. Great video, Bob.

tannerschumacher
Автор

Well done - +100 to the other comments. This is a logical and pragmatic overview of these ZT trends

kurtskowronek
Автор

This was a master class introduction to Zero Trust.I did not have to go google random and newly invented buzzword. Thank you!

apocalyps
Автор

great list of additional security measures to the basic ones

BDVSecurity
Автор

Omg, seriously everyone needs to know this! I was building technology from the ground up and our IT engineer ended up being an insider threat. He had all of our passcodes and source codes so in essence he had all of the power to do whatever he wanted including taking our software.

Sara-wbbs
Автор

Great presentation highlighting what this all means.

Can you please indicate which products and solutions help achieve this way of tackling zero trust and cybersecurity?

vdpoortensamyn
Автор

Good explanation! I just have one question: how do you write inverted?

neiker
Автор

Great video. Just small comment, it seems he says exactly the same fuction for ID Governance (Users) and AM (Access).

javieranayapacheco
Автор

The famous Bob of "Alice-Bob examples" in cryptography!

shubhamtanwar
Автор

Thanks for the nice overview. Do you have any thoughts on how a small start-up should configure itself for the future, given that tackling all of the dimensions you've noted here is very likely financially impractical. How should we design *now* so as to evolve over time toward a full realization of the concepts you've enumerated here?

drkevinsullivan
Автор

I loved the vdo, I’m a housewife but have interests in these kind of knowledge. Thank you sir

donasaha
Автор

Did you have to practice writing backwards?? Also thank you!

jackieb
Автор

Quick question, what do you use as that magic whiteboard? It’s an incredible teaching tool!

fortzafit-train
Автор

Thank you so much sir ^_^ I have learned a lot from you 🙂

Ahmed-gmli