Cyber attacks and security breaches : coping with external threats.
(eVideo)

Book Cover
Average Rating
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Status

Discover More!

More Details

Format
eVideo
Language
English

Notes

General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics for Access Data, offers expert advice and best practices that will help IT professionals keep their networks safe and secure. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of external network security threats today. Explain the techniques and methodologies being utilized by attackers. Understand how to reduce the risk of an external cyber-attack. Identify best practices that will help organizations keep their networks safe and secure.
System Details
Mode of access: World Wide Web.

Citations

APA Citation, 7th Edition (style guide)

(2014). Cyber attacks and security breaches: coping with external threats . Kanopy Streaming.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

2014. Cyber Attacks and Security Breaches: Coping With External Threats. Kanopy Streaming.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Cyber Attacks and Security Breaches: Coping With External Threats Kanopy Streaming, 2014.

MLA Citation, 9th Edition (style guide)

Cyber Attacks and Security Breaches: Coping With External Threats Kanopy Streaming, 2014.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.