- 77
- 67 780
SecureTheVillage
Приєднався 8 лют 2018
The vision of SecureTheVillage is to make Los Angeles the cyber-safest metropolitan region in the United States for smaller businesses, nonprofits, families, and individuals. Making this happen takes a village.
We turn people and organizations into CyberGuardians™ having the knowledge, skills, and commitment needed to meet the ongoing challenges of cyber crime, cyber privacy, and information security. We view our work as “securing the last mile” …enlisting everyone to secure their piece of the global village: at home, at work, and everywhere in between.
We accomplish our Mission by leveraging the cybersecurity community … by being a force multiplier, a catalyst, and a resource … making 1 + 1 = 1000.
From the Board Room to the Living Room - It takes a village to secure the village.™
SecureTheVillage is a 501(c)3 nonprofit.
We turn people and organizations into CyberGuardians™ having the knowledge, skills, and commitment needed to meet the ongoing challenges of cyber crime, cyber privacy, and information security. We view our work as “securing the last mile” …enlisting everyone to secure their piece of the global village: at home, at work, and everywhere in between.
We accomplish our Mission by leveraging the cybersecurity community … by being a force multiplier, a catalyst, and a resource … making 1 + 1 = 1000.
From the Board Room to the Living Room - It takes a village to secure the village.™
SecureTheVillage is a 501(c)3 nonprofit.
Ep. 5 | A New Level of Thinking
Albert Einstein famously said: “We can not solve our problems with the same level of thinking that created them”
Bill Gates clearly articulated the thinking that got us into our cybersecurity mess when he wrote in his 1999 book Business@The Speed of Thought: “How you gather, manage, and use information will determine whether you win or lose.”
Where are cybersecurity and privacy in Bill’s prediction, you ask? Exactly!! They’re not. They’re missing. Cybersecurity and privacy did not make it into Bill’s level of thinking until 2002.
Join Stan and Julie as they riff on the level of thinking required for cybersecurity and privacy.
We like to drive our cars fast. So we ensure they have good brakes, safety and crash systems, and drivers. And we need our vehicles to provide safety and performance feedback to the driver. A high-performance car without these is a danger. So we require car manufacturers to build safety and crash systems.
Central to this new level of cybersecurity and privacy thinking is the “driver’s” need for transparency in what applications are doing with the information we entrust to them … and the pitfalls waiting for companies failing to include security and customer privacy in their level of thinking. (We’re talking about you, GoodRX!!)
As always, Stan and Julie provide actionable tips and thoughtful wisdom in a fun conversation on the complexities of cybersecurity and privacy.
Bill Gates clearly articulated the thinking that got us into our cybersecurity mess when he wrote in his 1999 book Business@The Speed of Thought: “How you gather, manage, and use information will determine whether you win or lose.”
Where are cybersecurity and privacy in Bill’s prediction, you ask? Exactly!! They’re not. They’re missing. Cybersecurity and privacy did not make it into Bill’s level of thinking until 2002.
Join Stan and Julie as they riff on the level of thinking required for cybersecurity and privacy.
We like to drive our cars fast. So we ensure they have good brakes, safety and crash systems, and drivers. And we need our vehicles to provide safety and performance feedback to the driver. A high-performance car without these is a danger. So we require car manufacturers to build safety and crash systems.
Central to this new level of cybersecurity and privacy thinking is the “driver’s” need for transparency in what applications are doing with the information we entrust to them … and the pitfalls waiting for companies failing to include security and customer privacy in their level of thinking. (We’re talking about you, GoodRX!!)
As always, Stan and Julie provide actionable tips and thoughtful wisdom in a fun conversation on the complexities of cybersecurity and privacy.
Переглядів: 30
Відео
Ep. 4 | A Failure to Communicate
Переглядів 62Рік тому
“What we have here is a failure to communicate.” Strother Martin to Paul Newman in Cool Hand Luke. A related quote often attributed to George Bernard Shaw “The single biggest problem in communication is the illusion that it has taken place.” Join Stan and Julie as they riff on this all-too common challenge that what we say doesn’t always convey what we mean. In cybersecurity the failure to comm...
Ep. 2 | The Best Possible Time to be Alive
Переглядів 19Рік тому
Tom Stoppard, in his play "Arcadia" describes the scientific ferment of the 1820s as follows: "A door like this has cracked open five or six times since we got up on our hind legs. It's the best possible time to be alive, when almost everything you thought you knew is wrong." This is part of the way I feel about where we are today.… Everything we thought we knew is wrong. • What are facts? What...
Ep. 3 | Clear, Simple, and Wrong
Переглядів 14Рік тому
Noted author and satirist H.L. Mencken is famous for pointing out that “For every complex problem there is an answer that is clear, simple, and wrong.” Join Dr. Stan and Julie as they riff on this all-too-common human desire for simple solutions to complex problems. How it’s built into our neurology. How it makes it harder to manage cybersecurity. And even how it manifests in the conspiracy the...
Ep. 1 | Cybersecurity and the Breakdown of Trust
Переглядів 29Рік тому
In cybersecurity, We're being told "Don't trust. Verify." This makes the cybersecurity industry an unwilling active participant in the breakdown of trust in society. And yet, Francis Fukuyama, award-winning Stanford Professor, contends in his book “Trust: The Social Virtues and the Creation of Prosperity” that “in an era when social capital may be as important as physical capital, only those so...
SecureTheVillage presents Invasion of the Body & Mind (Data) Snatchers
Переглядів 52Рік тому
Recent news headlines suggest that vast amounts of our private physical health, mental health, genetics, and fitness data is being collected and sold without our knowledge or consent. Additionally, law enforcement has been requesting (sometimes via subpoena) and buying this data. Unfortunately, too many people assume this information is covered by HIPAA or other privacy laws, when in fact, HIPA...
CyberStevePhD: What is personal Cybersecurity - and why should it matter to me?
Переглядів 56Рік тому
What is personal cybersecurity? Let's walk you through it! maintaining control of personal information, while using computers, smartphones and other devices. Why do it? We want to safeguard your important and valuable personal information. Hear about cybercrime and how people have lost thousands of dollars, so you reduce the chances of this happening to you! SecureTheVillage
The Family Protection Minute: Freeze your credit!
Переглядів 15Рік тому
A 501c(3) nonprofit, SecureTheVillage is on a mission to educate, support, and advocate for cybersecurity and data privacy, with a vision of a cybersecure global village. Led by cybersecurity leaders, we a community-based response to the cybersecurity and privacy crisis. Learn more at securethevillage.org
What Every Business Leader Needs - A Reasonable Approach to Reasonable Security
Переглядів 1402 роки тому
Following last year’s successful symposium, this year’s event in support of Cybersecurity Awareness Month returns to the topic of reasonable security. Ask ten cybersecurity professionals what “reasonable security” is and you’ll likely get ten different answers. That’s because - truth be told - what counts as “reasonable security” is a work in progress. Notwithstanding the lack of clarity as to ...
What Every Citizen Needs to Know: 2022 Election Security
Переглядів 822 роки тому
Our democracy depends on getting the mid-term elections right. This means - first and foremost - getting cybersecurity right … Everything from protecting sensitive voter identities, registered voter lists, and voting machines; coming to grips with social media; and ensuring confidence in the outcomes. Find out what’s really going on from three of the nation’s leading experts in election cyberse...
Roe v Wade: Critical Implications for Our Personal Privacy
Переглядів 662 роки тому
The overturning of Roe v Wade has upended what privacy means for every single person in the USA. We invite you to a webinar with legal and privacy experts to learn what this ruling means for your personal privacy and safety. The panelists: - Explore the privacy implications of the Supreme Court’s recent ruling - Outline expected legal intrusions by states on personal privacy - Discuss how new s...
Security. Privacy. Freedom. ... A Conversation with Nicole Perlroth.
Переглядів 2112 роки тому
SecureTheVillage presents Nicole Perlroth, Award-winning Cybersecurity Journalist and New York Times Bestselling Author. ... An Event By & For Leaders in Cybersecurity. "This webinar was utterly fabulous. If you would have told me that I would sit for an hour and a half on a webinar about cybersecurity and know that even if it was longer I would still be enjoying it, I might think you're crazy....
CybersecureAmerica 2021: A Reasonable Approach to Reasonable Security, the Sequel
Переглядів 783 роки тому
SecureTheVillage Annual conference Recorded: October 21, 2021 References and Handout: Identifying Your Summary Information Security Risk Profile. securethevillage.org/reasonable-security-2021 Following last year’s successful symposium, this year’s annual symposium in support of Cybersecurity Awareness Month returns to the topic of reasonable security. Ask ten cybersecurity professionals what “r...
Inserting Risk into the Enterprise Vocabulary with Stevan Bernard
Переглядів 1343 роки тому
Title: Inserting Risk into the Enterprise Vocabulary with Stevan Bernard Description: Between the global pandemic and worldwide civil unrest, the risk landscape has drastically changed. Stevan Bernard will share how businesses can prepare for the ever-changing risk landscape. You Will Learn: - What risks businesses should be preparing for today. - How business leaders should be addressing brand...
High Risk Vendors and the Importance of SOC1 / SOC2 Reports with Robert Kluba
Переглядів 1663 роки тому
Financial Services Cybersecurity Roundtable, August 20, 2021 Title: High-Risk Vendors and the Importance of SOC1/SOC2 Reports Description: To demonstrate effective oversight of high-risk vendors, financial institutions must assess the adequacy of the service provider’s procedures and controls, and their ability to timely recover from significant business contingencies. Most vendors undergo an i...
SecureTheVillage - An Introduction & Podcast Trailer
Переглядів 2803 роки тому
SecureTheVillage - An Introduction & Podcast Trailer
Breach Case Study - Preparing for the Inevitable with Brad Maryman and Joe Greenfield
Переглядів 1033 роки тому
Breach Case Study - Preparing for the Inevitable with Brad Maryman and Joe Greenfield
Evolving Cybersecurity Policies for Financial Institutions
Переглядів 923 роки тому
Evolving Cybersecurity Policies for Financial Institutions
The Heart of Cybersecurity - Securing Our Connected World - Cybersecurity and Nonprofits
Переглядів 303 роки тому
The Heart of Cybersecurity - Securing Our Connected World - Cybersecurity and Nonprofits
Center for Internet Security, Version 8, with Barry Weber & Stan Stahl
Переглядів 973 роки тому
Center for Internet Security, Version 8, with Barry Weber & Stan Stahl
How to Protect Your Company Without Breaking the Bank
Переглядів 593 роки тому
How to Protect Your Company Without Breaking the Bank
Information Risk Management - The Rosetta Stone of Cybersecurity with Stan Stahl, PhD
Переглядів 1703 роки тому
Information Risk Management - The Rosetta Stone of Cybersecurity with Stan Stahl, PhD
The Heart of Cybersecurity - Keeping Your Organization Safe From Cybercrime with Kim Pease
Переглядів 413 роки тому
The Heart of Cybersecurity - Keeping Your Organization Safe From Cybercrime with Kim Pease
How to Protect Your Company Without Breaking the Bank
Переглядів 543 роки тому
How to Protect Your Company Without Breaking the Bank
Assisting the Victims of Cybercrime with Stacey Wright of the Cybercrime Support Network
Переглядів 683 роки тому
Assisting the Victims of Cybercrime with Stacey Wright of the Cybercrime Support Network
A Board's-Eye View of Managing Cyber Risk with Stan Stahl, PhD
Переглядів 703 роки тому
A Board's-Eye View of Managing Cyber Risk with Stan Stahl, PhD
How the CompTIA ISAO is Improving Cybersecurity Resilience with Mj Shoer
Переглядів 283 роки тому
How the CompTIA ISAO is Improving Cybersecurity Resilience with Mj Shoer
Financial Cybersecurity with Karl Mattson, CISO of PennyMac
Переглядів 1243 роки тому
Financial Cybersecurity with Karl Mattson, CISO of PennyMac
No Longer the House of “No” with Jeffrey Aguilar
Переглядів 803 роки тому
No Longer the House of “No” with Jeffrey Aguilar
Protecting Your Domain Controller - One of Your Most Critical Assets … with Ron Pelletier
Переглядів 433 роки тому
Protecting Your Domain Controller - One of Your Most Critical Assets … with Ron Pelletier
this great help for understanding how does management and leadership
"Most promising video. Kudos!"
This might be the most powerful overlooked video on UA-cam. Thank you!
Communication is such an integral part of success. Thanks for posting!
nice
Thank you so much for sharing a great level of information in the simple way
This was a spectacular discussion. Definitely has given me some food for though on how I can do things better in making cyber security approachable for our clients. Thank you Stan and STV and fellow panelists!
Thanks Alex. Your participation strengthened the panel. It takes a village ...
Fantastic Video!
This is great. Thank you!!
Thanks for sharing your experience.
Thank you for the discussion and sharing your experience with us. Curious if you feel like anything has changed in the approach since this was last published.
Great content and presentation. Thanks for sharing your experience.
I came across a life saver, cardboss19 on telegram i got my valid credit card with high balance on it
Great presentation - Thank you Stan and john!
"They are not gov't entities, but..." is always revealing.
wow SUNSPOT, manipulated event logs specific only to the SolarWind Dev Environment ...unique payload execution techniques to the target environment, that makes detection a pain. I suspect there are lots of victims that thought or still think they were the lucky ones that did not get infected.
Do we yet know how many ZERO-DAYS were used in this attack? how was this intrusion first detected, I am routing for staff training/awareness programmes? for some reason, my thoughts are that StuxNet set a precedent with its use of 0-days ...
really informative presentation. Great job.
Hi Sir, do you offer any training on ISM?
In Step 4:Determine Residual Risk Ratings, in the list of controls a vendor may have in place, what is the difference between 3-Documented company-wide policies and 8-Documented procedures in all areas?
are u pakistani
0:58 AutoProffitSystem codz2019.blogspot.com/2020/09/150-case-study.html
The day I met Cyberteam0 on telegram I started making money in BTC.. .
Waawww..so you you've also seen the work of this man @hackerjuan on telegram..I was doubting him at first but I just decided to test him and he sent me a working software that generate me 4.6BTC within 30minutes after I make him a little payment...I was really amazed
I never believe in hackers but this man Called hackerjuan is one of the best with his amazing software I generate 4btc without any stress..just with little payment..chat him up on telegram @hackerjuan
Don't be fooled by this fake video anymore..I was also a victim I loss $1000 to them..thanks to this great man Called hackerjuan on TELEGRAM..I was doubting him also but he prove me wrong by generating me 2.3btc within few minutes after I made him a little payment for his software...don't be fooled anymore and chat him up..on telegram @hackerjuan
ahahaha,,anda benar sekali mr.simple
PASTI ANAK2 IT RISK SEMESTER 3 LAGI GUPEK NYARI RESUME YANG GAK ADA BAHASA INDONESIANYA. KWKWKW