Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
Printable Handouts
Navigable Slide Index
- Introduction
- Practical cybersecurity
- Contents
- Takeaways
- Just the basics
- Top questions from enquiring minds
- Cargo cult security
- Ten immutable laws of security
- What is information?
- The benefits of protecting information
- Breaches in the news
- Why is information security a business imperative
- Important questions
- Program components 1-2
- Program components 3-4
- Program components 5-6
- Review
- Next module
This material is restricted to subscribers.
Topics Covered
- Top questions about cybersecurity
- Cargo cult security
- Immutable laws of security
- Physical vs. virtual assets
- IT security in a connected world
- The economic value of cybersecurity
Links
Series:
Categories:
External Links
Talk Citation
Popa, C. (2018, August 30). Introduction to practical cybersecurity [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved November 23, 2024, from https://doi.org/10.69645/PYVN7552.Export Citation (RIS)
Publication History
Transcript
Please wait while the transcript is being prepared...
0:00
Hello, and welcome to our sixth part series on practicals cybersecurity.
My name is Claudiu Popa,
and I will be your guide on this first leg of the journey.
0:12
My three colleagues and I are excited to unveil
the most important and interesting aspects of cybersecurity.
We'll explore threats, risk, compliance,
and many other topics to provide you with unprecedented access
to a concise set of professional techniques for minimizing risk,
protecting assets, safeguarding online identities,
and managing digital technologies.
Thanks for joining us.
On a personal note, you've chosen what I find to be
an endlessly fascinating topic and one that can be infinitely complex.
But it's only going to be fun if it's clear and concise.
So, we'll try to get right to the point and talk about what is cybersecurity.
According to Wikipedia, cybersecurity maps to computer security.
Computer security or IT security is the protection of
computer systems from theft and damage to their hardware,
software, information as well as from
disruption or misdirection of the services they provide.
Cybersecurity includes controlling physical access to the hardware as well
as protecting against harm that may come via network access,
data, and code injection.
Also due to malpractice by operators whether intentional or accidental,
IT security is susceptible to being tricked into
deviating from secure procedures through various methods.
Now, that's a pretty good definition,
but it's got a lot of technical language that really needs to be unpacked.
A lot of that is beyond the scope of this first slide,
but I wanted to mention that from a cybersecurity perspective,
that term has been around for the past 20 or so years.
It came, it picked up some momentum,
it went away as being somewhat uncool,
it was brought back,
and it's made a strong resurgence in the past few years.
So, we're basically stuck with it right now.
Generally speaking, cybersecurity means the protection of
information assets and all the devices that store them.
So, that could be computers,
that could be the Internet itself,
it could be hard drives,
it could be MP3 players,
it could be the entire Internet of things,
and all these connected devices.
So that's the general term for cybersecurity.
But ultimately, what it's all about is the valuable,
squishy, yummy stuff inside,
and that is information.
The information is what brings value to organizations and to economies nowadays.
That's the real reason we put together this course,
and I'm excited to explore it with you.
As a certified security professional,
I've had many years of training and preparation.
Even decades later, I still come across
new situations and scenarios that I've never encountered before.
So, it's not surprising that the prevention of data loss and breach response,
for example, are very difficult topics for many people.
In fact, they're completely counterintuitive.
The reality is that we live in a new age and it's an age that's changing fast.
These things need to be intuitive to be effective.
In fact, if they're not easily understood,
they're just not going to stick with you and you won't be able to keep up.
For us, that's one of the challenges of building a program that will not be
obsolete immediately after we record it or even years later.
I'm happy to say that the way we put together this program
will approach cybersecurity from the top down.
You will learn fundamental concepts.
You'll learn how to think about data protection,
about asset protection, about computer security,
and digital technologies in a way that will allow you to move in step with changes.
Of course, you'll be able to keep up with whatever the news brings on a daily basis.