A View from the Front Lines of Cybersecurity

  Рет қаралды 47,584

RSA Conference

RSA Conference

Күн бұрын

Sandra Joyce, Vice President and Head of Global Intelligence Operations, FireEye
Kevin Mandia, Chief Executive Officer, FireEye
As one of the foremost experts in cybersecurity, Kevin Mandia will discuss today’s threat environment and its impact on enterprises and agencies around the world. He will be joined on stage by Sandra Joyce, FireEye’s Senior Vice President of Global Intelligence, who will share insight into the threat actors, tactics and trends that are likely to play an integral role in the landscape of cybersecurity in the years to come.

Пікірлер: 7
@illuminated2438
@illuminated2438 4 жыл бұрын
With the quality of the speakers and the importance of their information and insight, their presentation should've been three times as long.
@whalingwithishmael7751
@whalingwithishmael7751 4 жыл бұрын
Thanks for the video. I feel like this guy is trying to convey at least 4 hours of information in 20 minutes
@Threatpost
@Threatpost 4 жыл бұрын
Great video; thanks for sharing.
@jarosawkurczewski8581
@jarosawkurczewski8581 4 жыл бұрын
👌100/100👍
@wootwootwoot32
@wootwootwoot32 5 жыл бұрын
Interesting
@shaungrace9745
@shaungrace9745 5 жыл бұрын
prevention of hacking: online id changed on computer daily/hourly and new id told to proper security site only (operator cannot see any id without sending signal to security), might prevent much hacking. Of course changing id is probably already used to leave false tracks so why not use it +vely people would have to pay up on time for security therefore people would need 3D face recognition with random move your head this way or that way question to open/continue using there might be hours of false computer time logged, ie. 1 computer runs ten software computers in one could confuse things as id all the same and passes through same chip, probably happening now of course etc need a phone barcode triple id security to be sent through to operator that gets scanned in camera of device to be used that way broken switching of continuous feed of camera harder to falsify (see previous of fake log time)
Insights from NSA’s Cybersecurity Threat Operations Center
45:21
RSA Conference
Рет қаралды 32 М.
Hot Ball ASMR #asmr #asmrsounds #satisfying #relaxing #satisfyingvideo
00:19
Oddly Satisfying
Рет қаралды 47 МЛН
Как быстро замутить ЭлектроСамокат
00:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 14 МЛН
ТАМАЕВ vs ВЕНГАЛБИ. Самая Быстрая BMW M5 vs CLS 63
1:15:39
Асхаб Тамаев
Рет қаралды 4,3 МЛН
El Tiempo de Dios!
1:00:59
El Redentor Pompano
Рет қаралды 718
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 149 М.
Weaponization of the Internet
41:18
RSA Conference
Рет қаралды 7 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
The Five Most Dangerous New Attack Techniques and How to Counter Them
46:51
The Cyber Skills Gap | Chris Silvers | TEDxElonUniversity
18:47
TEDx Talks
Рет қаралды 116 М.
Threat Modeling in 2019
51:21
RSA Conference
Рет қаралды 37 М.
Will the battery emit smoke if it rotates rapidly?
0:11
Meaningful Cartoons 183
Рет қаралды 20 МЛН
Mi primera placa con dios
0:12
Eyal mewing
Рет қаралды 719 М.
iPhone 15 Pro vs Samsung s24🤣 #shorts
0:10
Tech Tonics
Рет қаралды 14 МЛН