filmov
tv
Cyber Attack Prevention

Показать описание
What should you do to prevent cyber-attacks? Kelly Hynes McDermott interviews cybersecurity expert Kyle Lai to provide you with the 10 top recommendations from these U.S. Intelligence and Defense agencies:
• NSA (National Security Agency)
• DoD (Department of Defense)
• The White House
• FBI (Federal Bureau of Investigation)
• CISA (Cybersecurity & Infrastructure Security Agency)
This video is loaded with FREE (and USEFUL) information and is your best single best resource available today for cyber-attack prevention:
• Practical advice
• Links to free (and paid) cybersecurity software tools
• Free cybersecurity training resources.
And it features interesting conversations about Kyle’s 30 year IT/cybersecurity field experience on the front lines of information security - fixing and preventing IT disasters.
0:00 - Intro
1:08 – Validate Access Controls
4:34 – Perform a Vulnerability Assessment / Penetration Test
9:38 – Enhance Network Perimeter Security
13:26 – Enable Multi-Factor Authentication
18:24 – Validate Backup Functionality
22:28 – Endpoint Detection and Response
27:37 – Verify Security Patching
33:49 – Provide Cybersecurity Awareness Training
40:31 – Segment and Patch IoT, OT, and Test Equipment
44:20 – Incident Response Plan Development and Testing
• NSA (National Security Agency)
• DoD (Department of Defense)
• The White House
• FBI (Federal Bureau of Investigation)
• CISA (Cybersecurity & Infrastructure Security Agency)
This video is loaded with FREE (and USEFUL) information and is your best single best resource available today for cyber-attack prevention:
• Practical advice
• Links to free (and paid) cybersecurity software tools
• Free cybersecurity training resources.
And it features interesting conversations about Kyle’s 30 year IT/cybersecurity field experience on the front lines of information security - fixing and preventing IT disasters.
0:00 - Intro
1:08 – Validate Access Controls
4:34 – Perform a Vulnerability Assessment / Penetration Test
9:38 – Enhance Network Perimeter Security
13:26 – Enable Multi-Factor Authentication
18:24 – Validate Backup Functionality
22:28 – Endpoint Detection and Response
27:37 – Verify Security Patching
33:49 – Provide Cybersecurity Awareness Training
40:31 – Segment and Patch IoT, OT, and Test Equipment
44:20 – Incident Response Plan Development and Testing