♫musicjinni

Security Design Strategies for the Age of BYO

video thumbnail
Secure360 2020 - Security happens where man meets machine. Or, fails to happen, as we see all too often. Blame the users. They’ll click anything. Blame the developers. Half their code is riddled with vulnerabilities anyways. Blame the IT staff. You’d think they’d at least know better. But perhaps, we’ve been placing the blame on the wrong places. What exactly happens where people and technology meet? At that moment, that very moment, what factors in human psychology and industrial design are at play? And suppose we could pause time for a moment. Suppose we could tease out those factors. Could we design a better experience, design a better outcome, design a better path to the future? This session explores these questions and identifies lessons the cyber security field can learn from industrial design.

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

The Basics of Cyber Security - Part 2 - Thinking Technology & Design

Hack Your Stakeholder: Eliciting Intelligence Requirements with Design Thinking

Cybersecurity Architecture: Networks

What does a security engineer do? | Cybersecurity Career Series

Cybersecurity Architecture: Roles and Tools

Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security | Simplilearn

The Pros and Cons of Cybersecurity!

Designing Security for Systems that are Bigger on the Inside

I got a $70k tech certification job without a degree

Security Thinking Is Service Design Thinking

[GRIMMCon0x4] Design Thinking for Blue Teams

Cimlogic Webinar - Secure by Design Cyber Security

Is cyber security hard for beginners?

Cyber Security Awareness - Think before click - Funny But Serious

How a cyber security architect should think while designing...

Design: Human-centered Security

Top 5 Cyber Security Tools | Tools For Cyber Security | Top Cyber Security Tools | Intellipaat

What does a cloud security engineer do? | Cybersecurity Career Series

Designing an Effective Cyber Security Program | The Right Security

What You Should Learn Before "Cybersecurity" - 2023

Chapter 1 - Lesson 4 - Security Architecture Design choices

Zero Trust Architecture 101 - A 5 Minute Explanation

Ethical hacking

CAVs and Cyber Beyond securities by design

Cyber Security Interview Questions You Must Know (Part 1)

Why most beginners fail at Cyber Security

Job hunting tips for cybersecurity professionals | Cyber Work Podcast

Security Awareness Episode 8: Wi-Fi

Security and Humans

Disclaimer DMCA