The case “Cyber Security Myths, Secrets & Lies” belongs to the course for managers responsible for security in their companies. It reveals what every manager needs to know about Cyber Security Myths, Secrets, and lies. It is written in a world full of tricky advertising, where people do not know the true position of hacked companies, and it informs about the dangers of being taken advantage of by hackers.
The “Cyber Security Myths, Secrets & Lies” guests can get the knowledge, which would usually cost a lot of money. These understandings help them prevent the mistakes that can lead to the critical violation of network space, protecting their professional image and organizational integrity. Moreover, it enhances the decision-making capabilities so that all the attendees can advance in their cyber security careers and cautiously develop the sector free from unreliable technologies promoted by various selfish interests.
Cyber Security Myths, Secrets & Lies Table of Contents:
- Welcome & Introduction (Duration: 04:19)
- Lie #1: Breaches are inevitable (Duration: 20:46)
- Myth #1: Cyber attacks are targeted (Duration: 16:27)
- Secret #1: Hacker attack vectors (Duration: 17:13)
- Secret #2: Understanding vulnerabilities (Duration: 20:09)
- Myth #2: You get hacked when you don't buy the latest cyber security tech (Duration: 18:55)
- Myth #3: You should be concerned about the insider threat (Duration: 16:55)
- Lie #2: New IT technologies improve cyber security (Duration: 23:28)
- Lie #3: Moving to the cloud improves cyber security (Duration: 17:15)
- Lie #4: BYOD is a good idea (Duration: 17:32)
- Lie #5: Dark Web monitoring works (Duration: 13:31)
- Lie #6: Zero-day protection works (Duration: 11:26)
- Myth #4: Data Loss Prevention works (Duration: 18:12)
- Myth #5: Secure email is a good idea (Duration: 18:30)
- Myth #6: Your insurance company's incident response will protect you (Duration: 14:36)
- Myth #7: Big organizations are good at cyber security (Duration: 19:36)
- Myth #8: IT knows what they are doing (Duration: 11:51)
- Myth #9: Rotating your penetration testers is a good idea (Duration: 15:37)
- Myth #10: Changing your password regularly enhances your cyber security (Duration: 11:36)
- Myth #11: Your web designer is providing cyber security (Duration: 13:23)
- Myth #12: Cyber security user education is working (Duration: 12:21)
- Secret #3: Ransomware doesn't always encrypt your data/systems (Duration: 09:39)
- Secret #4: Management can make good cyber security decisions (Duration: 20:56)
- Secret #5: The golden rules of resource allocation (Duration: 11:51)
- Secret #6: Don't focus on the hackers (Duration: 09:42)
- Secret #7: Doing the basics (well) (Duration: 13:17)
Who is this course for?
- This course is intended for anyone currently or planning to assume the role of cybersecurity in an organization.
Click on the links below to Download Cyber Security Myths, Secrets & Lies!
You are replying to :