×

Do you recommend this title? Yes

From
Paul C Dwyer
Genre
Duration
3 hours 47 minutes
Subtitles
0 languages + Show
Availability
Worldwide

Subtitles

Subtitles are available for these languages:

Availability

This title is available in these regions:

Episodes

Cyber Governance - What The Board Needs To Know And Do About Cyber Threats

Executive Cyber Security Briefing

Released
Duration
54:44
Rental period
3 months

Cyber Governance - What The Board Needs To Know And Do About Cyber Threats

Paul C Dwyer Security GRC and Cyber Threat Advisor will outline what exactly the board of directors should know and do about cyber threats in 2013.

He will outline pragmatic steps they can take in relation to corporate governance and cyber risk management. He will also discuss the merits of "proactive cyber defence" and there will be an opportunity for a Q&A session.

What Are Cyber Threats?
Motivations
What is Corporate Governance?
What Are The Components of Cyber Security Management?
How Complicated is All of This?
What About Laws and Regulations?
What About Directors and Their Responsibility
How Do Organisations Manage This?
Can We Put It All In To Context (Lessons Learned)
Crisis Management
Automatic Governance Event
Top 10 Actions For The Board
What About Being Proactive?
Summary

$29.99
Cloud Security & GRC

Executive Cyber Security Briefing

Released
Duration
20:05
Rental period
3 months

Cloud Security & GRC

This portfolio “Executive Cyber Intelligence Briefing” was designed specifically for CxO level and senior management.

The content and delivery methodology is specifically aimed at busy senior executives that wish to gain a real understanding of the issues involved.

The CTP (Cyber Threat Professional) Level I training course is designed to augment existing experience and qualifications. The objective is to demystify the world of cyber threats in a “Boot Camp” style course.

In the media every day we read and hear of “Cyber Threats!”. Stories of huge corporations brought to their knees with billions wiped off share prices apparently by gangs of online thugs with little by way of motivation except for cheap hacking thrills. We outline what exactly is going on.

Aimed at senior business leaders and decision makers this low technical workshop explains from the basics of what is behind the proliferation of Cybercrime, non state and state backed attacks.
We uncover the world of “Anonymous” and hacktivists. Based on access and material from the underground including exclusive interviews from key players in “Anonymous”. Our investigations into the structure and motivations of the group are explained. We reveal the blurred lines behind various threat groups and the underground economy of Cybercrime.

From credit card fraud to industrial espionage, from identity theft to selling information on sick babies this murky world is unmasked. We discover the “cyber arms race” and how terrorists can potentially take down a country for US$6m.

The cyber risks associated with the cloud and social media are explained and how the criminal R&D departments are working overtime on developing new forms of mobile malware.

This fascinating insight into a shadowy world controlled more and more each day by organised crime syndicates is a must for anyone that wishes to understand the risks involved. This briefing will provide you with a wealth of knowledge and educate you on the reality of cyber threats.

In this module we focus on the Cyber Threats in relation to Cloud Computing and GRC.

$29.99
Cyber Insider - Profiling The Risk of a Cyber Insider

Executive Cyber Security Briefing

Released
Duration
28:20
Rental period
3 months

Cyber Insider - Profiling The Risk of a Cyber Insider

This portfolio “Executive Cyber Intelligence Briefing” was designed specifically for CxO level and senior management.

The content and delivery methodology is specifically aimed at busy senior executives that wish to gain a real understanding of the issues involved.

The CTP (Cyber Threat Professional) Level I training course is designed to augment existing experience and qualifications. The objective is to demystify the world of cyber threats in a “Boot Camp” style course.

In the media every day we read and hear of “Cyber Threats!”. Stories of huge corporations brought to their knees with billions wiped off share prices apparently by gangs of online thugs with little by way of motivation except for cheap hacking thrills. We outline what exactly is going on.

Aimed at senior business leaders and decision makers this low technical workshop explains from the basics of what is behind the proliferation of Cybercrime, non state and state backed attacks.
We uncover the world of “Anonymous” and hacktivists. Based on access and material from the underground including exclusive interviews from key players in “Anonymous”. Our investigations into the structure and motivations of the group are explained. We reveal the blurred lines behind various threat groups and the underground economy of Cybercrime.

From credit card fraud to industrial espionage, from identity theft to selling information on sick babies this murky world is unmasked. We discover the “cyber arms race” and how terrorists can potentially take down a country for US$6m.

The cyber risks associated with the cloud and social media are explained and how the criminal R&D departments are working overtime on developing new forms of mobile malware.

This fascinating insight into a shadowy world controlled more and more each day by organised crime syndicates is a must for anyone that wishes to understand the risks involved. This briefing will provide you with a wealth of knowledge and educate you on the reality of cyber threats.

In this module we focus on the risks associated with "Insiders" and examine techniques on how to profile the risk of an insider turning bad.

$29.99
An Overview of Crimeware

Executive Cyber Security Briefing

Released
Duration
10:03
Rental period
3 months

An Overview of Crimeware

This portfolio “Executive Cyber Intelligence Briefing” was designed specifically for CxO level and senior management.

The content and delivery methodology is specifically aimed at busy senior executives that wish to gain a real understanding of the issues involved.

The CTP (Cyber Threat Professional) Level I training course is designed to augment existing experience and qualifications. The objective is to demystify the world of cyber threats in a “Boot Camp” style course.

In the media every day we read and hear of “Cyber Threats!”. Stories of huge corporations brought to their knees with billions wiped off share prices apparently by gangs of online thugs with little by way of motivation except for cheap hacking thrills. We outline what exactly is going on.

Aimed at senior business leaders and decision makers this low technical workshop explains from the basics of what is behind the proliferation of Cybercrime, non state and state backed attacks.
We uncover the world of “Anonymous” and hacktivists. Based on access and material from the underground including exclusive interviews from key players in “Anonymous”. Our investigations into the structure and motivations of the group are explained. We reveal the blurred lines behind various threat groups and the underground economy of Cybercrime.

From credit card fraud to industrial espionage, from identity theft to selling information on sick babies this murky world is unmasked. We discover the “cyber arms race” and how terrorists can potentially take down a country for US$6m.

The cyber risks associated with the cloud and social media are explained and how the criminal R&D departments are working overtime on developing new forms of mobile malware.

This fascinating insight into a shadowy world controlled more and more each day by organised crime syndicates is a must for anyone that wishes to understand the risks involved. This briefing will provide you with a wealth of knowledge and educate you on the reality of cyber threats.

In this module we examine Crimeware and take a look at how "Spyeye" operates

$29.99
Part 1 of 2 - Overview of Cyber Threats - Executive Perspective

Executive Cyber Security Briefing

Released
Duration
46:04
Rental period
3 months

Part 1 of 2 - Overview of Cyber Threats - Executive Perspective

Cyber Basics

We start at the beginning. Understand the background to various types of cyber threats. The blurred lines between criminals, hactivists, spies and government bodies. We explain the reasons behind the proliferation of cyber threats over recent years and outline what is real and what is hype!

Cybercrime

We explain the sophisticated underground economy of cybercrime. The main actors, roles and techniques employed. Using real life examples of sophisticated vs. non sophisticated vectors. Using real life examples of “underground stock exchanges” where criminals of all levels throughout the world buy and sell stolen data online.

Cyberwarfare

Is it real? The war is on and its an economic war. We explain who are the big players and what governments around the world are doing about it behind the scenes. We look at cyber weapons and mercenaries for hire and outline the links with cyber terrorism and corporate espionage.
Cyber Security GRC & Cloud Computing

We outline the main security considerations you need to consider in relation to cloud computing. It’s not all about technology, we take a holistic view and outline what the board needs to know when it comes to cyber risk, compliance and cloud computing.

Cyber Laws

Laws, regulations, treaties what you need to know. How are Directors responsible for cyber threats? How is legislation changing and what is in the pipe line.
Social Media and Cyber Risk

What are the risks of involved in utilising social media networks? How are criminals infiltrating these networks to their advantage and duping employees into revealing corporate secrets.

Cyber Insider Risk

Insiders such as employees, third parties and business partners represent probably the greatest risk to an organisation in proportion to their numbers. How do you spot a good employee turned bad? Learn how the FBI do it. We explain how to perform a human risk assessment on key employees.

Mobile Cyber Threats

With more mobile devices than people on the planet this is an area of technology that simply cannot be ignored. What are the particular cyber threats you should be aware of? What are the R&D departments of the “bad guys” working on? How to you embrace this technology in a strategic manner?

Hactivisim

If money is not the motivation, what is? With groups like Lulzsec and Anonymous in the news we explain the background structure and motivation of these groups. What is their capacity? Should you be worried? We unmask these groups and outline how they operate and what makes them tick.

Cyber Risk Management

Understanding cyber threats is important but managing the risks is key. We explain how you can put metrics against various types of cyber threats from technology based issues to highlighting weak processes and controls. Most importantly, rather than create another security audit we explain how to communicate these risks to the business.

$29.99
Cyberwarfare - An Executive Overview - Is it Real?

Executive Cyber Security Briefing

Released
Duration
20:41
Rental period
3 months

Cyberwarfare - An Executive Overview - Is it Real?

This portfolio “Executive Cyber Intelligence Briefing” was designed specifically for CxO level and senior management.

The content and delivery methodology is specifically aimed at busy senior executives that wish to gain a real understanding of the issues involved.

The CTP (Cyber Threat Professional) Level I training course is designed to augment existing experience and qualifications. The objective is to demystify the world of cyber threats in a “Boot Camp” style course.

In the media every day we read and hear of “Cyber Threats!”. Stories of huge corporations brought to their knees with billions wiped off share prices apparently by gangs of online thugs with little by way of motivation except for cheap hacking thrills. We outline what exactly is going on.

Aimed at senior business leaders and decision makers this low technical workshop explains from the basics of what is behind the proliferation of Cybercrime, non state and state backed attacks.
We uncover the world of “Anonymous” and hacktivists. Based on access and material from the underground including exclusive interviews from key players in “Anonymous”. Our investigations into the structure and motivations of the group are explained. We reveal the blurred lines behind various threat groups and the underground economy of Cybercrime.

From credit card fraud to industrial espionage, from identity theft to selling information on sick babies this murky world is unmasked. We discover the “cyber arms race” and how terrorists can potentially take down a country for US$6m.

The cyber risks associated with the cloud and social media are explained and how the criminal R&D departments are working overtime on developing new forms of mobile malware.

This fascinating insight into a shadowy world controlled more and more each day by organised crime syndicates is a must for anyone that wishes to understand the risks involved. This briefing will provide you with a wealth of knowledge and educate you on the reality of cyber threats.

Cyberwarfare - Is it real? The war is on and its an economic war. We explain who are the big players and what governments around the world are doing about it behind the scenes. We look at cyber weapons and mercenaries for hire and outline the links with cyber terrorism and corporate espionage.

$29.99
Part 2 of 2 - Overview of Cyber Threats and Executives Perspective

Executive Cyber Security Briefing

Released
Duration
47:37
Rental period
3 months

Part 2 of 2 - Overview of Cyber Threats and Executives Perspective

Cyber Basics

We start at the beginning. Understand the background to various types of cyber threats. The blurred lines between criminals, hactivists, spies and government bodies. We explain the reasons behind the proliferation of cyber threats over recent years and outline what is real and what is hype!

Cybercrime

We explain the sophisticated underground economy of cybercrime. The main actors, roles and techniques employed. Using real life examples of sophisticated vs. non sophisticated vectors. Using real life examples of “underground stock exchanges” where criminals of all levels throughout the world buy and sell stolen data online.

Cyberwarfare

Is it real? The war is on and its an economic war. We explain who are the big players and what governments around the world are doing about it behind the scenes. We look at cyber weapons and mercenaries for hire and outline the links with cyber terrorism and corporate espionage.
Cyber Security GRC & Cloud Computing

We outline the main security considerations you need to consider in relation to cloud computing. It’s not all about technology, we take a holistic view and outline what the board needs to know when it comes to cyber risk, compliance and cloud computing.

Cyber Laws

Laws, regulations, treaties what you need to know. How are Directors responsible for cyber threats? How is legislation changing and what is in the pipe line.
Social Media and Cyber Risk

What are the risks of involved in utilising social media networks? How are criminals infiltrating these networks to their advantage and duping employees into revealing corporate secrets.

Cyber Insider Risk

Insiders such as employees, third parties and business partners represent probably the greatest risk to an organisation in proportion to their numbers. How do you spot a good employee turned bad? Learn how the FBI do it. We explain how to perform a human risk assessment on key employees.

Mobile Cyber Threats

With more mobile devices than people on the planet this is an area of technology that simply cannot be ignored. What are the particular cyber threats you should be aware of? What are the R&D departments of the “bad guys” working on? How to you embrace this technology in a strategic manner?

Hactivisim

If money is not the motivation, what is? With groups like Lulzsec and Anonymous in the news we explain the background structure and motivation of these groups. What is their capacity? Should you be worried? We unmask these groups and outline how they operate and what makes them tick.

Cyber Risk Management

Understanding cyber threats is important but managing the risks is key. We explain how you can put metrics against various types of cyber threats from technology based issues to highlighting weak processes and controls. Most importantly, rather than create another security audit we explain how to communicate these risks to the business.

$29.99