In this video, explore the emerging threat sources you can learn from.
- [Instructor] Each and every day,…we as cyber security professionals must attempt…to get better at our jobs.…In addition to each layer of defense…that we add, though, we also have to be continually…on the lookout for new threat sources…and intelligence to learn from them.…Why? Well, because there are new cyber threats…that emerge each and every day.…If we don't keep ourself updated,…then the threat actors…can successfully exploit our networks.…Unfortunately, no organization is bulletproof.…No matter how we lay out our defenses,…and no matter how much we continually harden our networks,…hacker will always attempt to find a chink in our armor…and find a way into our networks.…
After all, if there's money to be made from hacking,…there will always be new hackers…who are attempting to break into our enterprise networks.…Often, our networks rely on signature-based defenses,…but it's also important for us to use heuristics.…Heuristics have a better chance…of finding an emerging threat source…than does a signature-based defense.…
Author
Released
11/16/2018- Best practices for conducting research
- Current threats and threat models
- Emerging social media platforms and their threats
- Integrating research into business functions
- Security activities across the systems and software development lifecycles
- Adapting solutions to meet business needs
- Collaborating with programmers, sales staff, facilities managers, and others
- Providing guidance to senior management
Skill Level Advanced
Duration
Views
Related Courses
-
Introduction
-
What you should know1m 27s
-
About the exam1m 48s
-
1. Research Methods
-
Conducting research6m 16s
-
Zero-day mitigation controls2m 27s
-
Threat actor activities2m 20s
-
Emerging threat sources1m 25s
-
-
2 Security Activities across the Life Cycle
-
Operational activities4m 19s
-
Software assurance9m 32s
-
Approaches to development5m 45s
-
Documentation3m 30s
-
3. Collaboration with Other Business Units
-
Sales staff1m 38s
-
Programmer1m 6s
-
Database administrator1m 46s
-
Network administrator1m 51s
-
Financial1m 27s
-
Human resources1m 2s
-
Emergency response team1m 37s
-
Facilities manager1m 31s
-
Physical security manager1m 22s
-
Legal counsel1m 49s
-
Conclusion
-
What to do next2m 49s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Emerging threat sources