Télécommunications

Biological Viruses vs Computer Viruses | Security Confidential

#SecurityConfidential #darkrhinosecurity

Wendy is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. Prior to joining OneWeb, Wendy was Experian’s DevSecOps Security Managing Adviser and defined the strategy for the organization’s global DevSecOps transformation initiative. Wendy is active in the community, regularly sharing experiences through keynotes, Blogs, and Black Hat.

00:00 Introduction
00:21 Our Guest
01:40 Transitioning from Medical Genetics to Cyber
04:50 The importance of having people from different fields
07:41 Comparisons between Biological Virus and Breach
12:09 Low Earth Orbit Constellation
18:18 Hackers are Collaborative
22:01 100% Security
26:30 Understanding the Risk
30:40 Building a Culture of Awareness
35:35 DevSecOps
38:50 Controlling that 3rd party risk
43:15 Connecting with Wendy

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
———————————————————————-

SOCIAL MEDIA:
Stay connected with us on our social media pages where we’ll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security ​
———————————————————————-
Articles Mentioned:
https://hubsecurity.com/blog/our-events/zero-trust-speaker-spotlight-with-wendy/

https://medium.com/epic-women-in-cyber/epic-women-in-cyber-dr-wendy-ng-70308ade5615

https://www.inspiredbusinessmedia.com/speaking-with-onewebs-wendy-ng/

https://www.linkedin.com/pulse/black-hat-mea-cyber-considerations-leo-constellations-dr-wendy/

https://cyber-security.degree/resources/history-of-cyber-security/

Eczema and Washing Hands Frequently

Cyber-Attack Dwell Time: How Low Can You Go (Before It Really Helps)?

https://www.avast.com/c-hacker-types#:~:text=White%20hat%20hackers%20probe%20cybersecurity,re%20not%20always%20ethical%20either.
———————————————————————-

Views : 20
cyber security

Source by Dark Rhino Security

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *