A View from the Front Lines of Cybersecurity

Sdílet
Vložit
  • čas přidán 3. 06. 2024
  • Sandra Joyce, Vice President and Head of Global Intelligence Operations, FireEye
    Kevin Mandia, Chief Executive Officer, FireEye
    As one of the foremost experts in cybersecurity, Kevin Mandia will discuss today’s threat environment and its impact on enterprises and agencies around the world. He will be joined on stage by Sandra Joyce, FireEye’s Senior Vice President of Global Intelligence, who will share insight into the threat actors, tactics and trends that are likely to play an integral role in the landscape of cybersecurity in the years to come.
  • Věda a technologie

Komentáře • 7

  • @illuminated2438
    @illuminated2438 Před 4 lety +4

    With the quality of the speakers and the importance of their information and insight, their presentation should've been three times as long.

  • @whalingwithishmael7751
    @whalingwithishmael7751 Před 4 lety +15

    Thanks for the video. I feel like this guy is trying to convey at least 4 hours of information in 20 minutes

  • @Threatpost
    @Threatpost Před 4 lety +3

    Great video; thanks for sharing.

  • @jarosawkurczewski8581
    @jarosawkurczewski8581 Před 4 lety +2

    👌100/100👍

  • @shaungrace9745
    @shaungrace9745 Před 5 lety +2

    prevention of hacking: online id changed on computer daily/hourly and new id told to proper security site only (operator cannot see any id without sending signal to security), might prevent much hacking. Of course changing id is probably already used to leave false tracks so why not use it +vely
    people would have to pay up on time for security therefore
    people would need 3D face recognition with random move your head this way or that way question to open/continue using
    there might be hours of false computer time logged, ie. 1 computer runs ten software computers in one could confuse things as id all the same and passes through same chip, probably happening now of course
    etc
    need a phone barcode triple id security to be sent through to operator that gets scanned in camera of device to be used that way broken switching of continuous feed of camera harder to falsify (see previous of fake log time)

  • @wootwootwoot32
    @wootwootwoot32 Před 4 lety +4

    Interesting