56:11
IT Security Fundamentals with MVP Don Jones
http://www.trainsignal.com/blog/webinars?utm_source=YouTube&utm;_medium=SocialMedia&utm;_con...
published: 27 Jul 2012
author: TrainSignal
IT Security Fundamentals with MVP Don Jones
IT Security Fundamentals with MVP Don Jones
http://www.trainsignal.com/blog/webinars?utm_source=YouTube&utm;_medium=SocialMedia&utm;_content=SecurityFundamentals&utm;_campaign=Webinars One of the trickies...- published: 27 Jul 2012
- views: 3095
- author: TrainSignal
4:39
Cyber Security. Evolved.
In less than 300 seconds you can experience the speed and intensity of a cyber attack. Tod...
published: 04 Feb 2013
author: DeloitteUK
Cyber Security. Evolved.
Cyber Security. Evolved.
In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend themselves, taking control of the situation...- published: 04 Feb 2013
- views: 52783
- author: DeloitteUK
41:47
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence...
published: 05 Sep 2013
Introduction to Computer Security - Information Security Lesson #1 of 12
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, types of attackers, methods of defense, and multi-layered security.- published: 05 Sep 2013
- views: 17
2:51
A day in the life of IT security
Find out how IT security take back control of the endpoint in this animation Learn more ab...
published: 27 Jul 2012
author: Kaspersky
A day in the life of IT security
A day in the life of IT security
Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...- published: 27 Jul 2012
- views: 8289
- author: Kaspersky
90:21
Bruce Schneier & Jonathan Zittrain on IT, Security, and Power
How does the Internet affect power? How does power affect the Internet? Factors such as ub...
published: 05 Apr 2013
author: BerkmanCenter
Bruce Schneier & Jonathan Zittrain on IT, Security, and Power
Bruce Schneier & Jonathan Zittrain on IT, Security, and Power
How does the Internet affect power? How does power affect the Internet? Factors such as ubiquitous surveillance, the rise of cyberwar, ill-conceived laws and...- published: 05 Apr 2013
- views: 1894
- author: BerkmanCenter
64:30
[Presentation] Malware 101: A how-to guide for IT security beginners
Sophos security expert Maxim Weinstein (in conjunction with The Center for Internet Securi...
published: 16 Oct 2013
[Presentation] Malware 101: A how-to guide for IT security beginners
[Presentation] Malware 101: A how-to guide for IT security beginners
Sophos security expert Maxim Weinstein (in conjunction with The Center for Internet Security) helps beginners learn how malware works, how it spreads, how security measures can detect and block it, and why it's still a problem despite advances in security technology. Maxim walks through a real-world example (the compromise of NBC.com from 2013) and provides definitions of common terms along the way. Get our free A-Z Threat Guide: http://bit.ly/15FlXbv- published: 16 Oct 2013
- views: 26
58:11
Kaseya: Ensuring IT Security: Best practices for performing proactive security audits
The increased use of electronic medical records, mobile devices and cloud computing in the...
published: 30 May 2013
author: kaseyacorp
Kaseya: Ensuring IT Security: Best practices for performing proactive security audits
Kaseya: Ensuring IT Security: Best practices for performing proactive security audits
The increased use of electronic medical records, mobile devices and cloud computing in the healthcare environment is also increasing the risk of data securit...- published: 30 May 2013
- views: 153
- author: kaseyacorp
33:36
IT security presentation from James Lyne at CWJobs' 2011 Breakfast Briefing
IT security presentation from James Lyne at Sophos at CWJobs' 2011 Breakfast Briefing....
published: 04 Aug 2011
author: CWJobs.co.uk
IT security presentation from James Lyne at CWJobs' 2011 Breakfast Briefing
IT security presentation from James Lyne at CWJobs' 2011 Breakfast Briefing
IT security presentation from James Lyne at Sophos at CWJobs' 2011 Breakfast Briefing.- published: 04 Aug 2011
- views: 2211
- author: CWJobs.co.uk
27:26
Today's Corporate IT Security Threats
Costin Raiu, Director of Kaspersky Lab's Global Research & Analysis Team talks about the m...
published: 15 Feb 2013
author: Kaspersky
Today's Corporate IT Security Threats
Today's Corporate IT Security Threats
Costin Raiu, Director of Kaspersky Lab's Global Research & Analysis Team talks about the most important steps in the malware evolution from vandalism tools t...- published: 15 Feb 2013
- views: 503
- author: Kaspersky
5:23
IT Security Overview for Princeton Students
An overview of risks to the University's and our personal information and systems, and tip...
published: 31 Jan 2014
IT Security Overview for Princeton Students
IT Security Overview for Princeton Students
An overview of risks to the University's and our personal information and systems, and tips for reducing those risks.- published: 31 Jan 2014
- views: 8
2:51
Be a Hero...Be an IT Security Specialist
The world economy and infrastructure is at risk from those who want to use computers for b...
published: 03 Apr 2012
author: ComptiaAmericaLatina
Be a Hero...Be an IT Security Specialist
Be a Hero...Be an IT Security Specialist
The world economy and infrastructure is at risk from those who want to use computers for bad. Be a hero. Be an IT Security Specialist.- published: 03 Apr 2012
- views: 440
- author: ComptiaAmericaLatina
22:53
Cyber Security History, Threats, & Solutions - 2013
ISM5021 Spring 2013 - IT in the News Project Presentation - Group 12....
published: 18 Mar 2013
author: Scott Wood
Cyber Security History, Threats, & Solutions - 2013
Cyber Security History, Threats, & Solutions - 2013
ISM5021 Spring 2013 - IT in the News Project Presentation - Group 12.- published: 18 Mar 2013
- views: 147
- author: Scott Wood
Youtube results:
2:05
Advanced Targeted Attack Protection | The $20 Billion IT Security Gap
Learn why the $20 billion spent on IT security each year is ineffective against advanced c...
published: 21 May 2012
author: FireEyeInc
Advanced Targeted Attack Protection | The $20 Billion IT Security Gap
Advanced Targeted Attack Protection | The $20 Billion IT Security Gap
Learn why the $20 billion spent on IT security each year is ineffective against advanced cyber attacks that evade traditional and next-generation firewalls, ...- published: 21 May 2012
- views: 2351
- author: FireEyeInc
2:00
Sh*t I.T. Security Guys Say
Sh*t IT Security Guys Say is a fun short clip of some of the things IT Security guys might...
published: 06 Feb 2012
author: GazzangInc
Sh*t I.T. Security Guys Say
Sh*t I.T. Security Guys Say
Sh*t IT Security Guys Say is a fun short clip of some of the things IT Security guys might say. We bet you have heard ones that are even better. Let us know!...- published: 06 Feb 2012
- author: GazzangInc
12:14
Intro to IT Security & Forensics - Module 1: Anonymity on the Internet
As part of a longer course - this first short module lays the foundation for an introducti...
published: 19 Oct 2013
Intro to IT Security & Forensics - Module 1: Anonymity on the Internet
Intro to IT Security & Forensics - Module 1: Anonymity on the Internet
As part of a longer course - this first short module lays the foundation for an introduction to information security and computer forensics. Led by instructor Jeremy Martin of InfoSec Institute (http://www.infosecinstitute.com)- published: 19 Oct 2013
- views: 508
1:42
Risk management - converging physical and IT security
http://pixvid.me/ConvergedSecurity In IDG's annual "State of the CSO" research survey of s...
published: 20 Aug 2012
author: EnterpriseCIOForum
Risk management - converging physical and IT security
Risk management - converging physical and IT security
http://pixvid.me/ConvergedSecurity In IDG's annual "State of the CSO" research survey of security managers more than half of respondents indicated that they ...- published: 20 Aug 2012
- views: 5632
- author: EnterpriseCIOForum