Artwork

Contenu fourni par Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !

CCT 153: CISSP Practice Questions - Ransomware Attacks and Understanding IoT Trustworthiness (Domain 5)

22:08
 
Partager
 

Manage episode 425894478 series 3464644
Contenu fourni par Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

Send us a Text Message.

Could a seemingly minor breach at a smaller bank signal bigger vulnerabilities in our financial system? On this episode of the CISSP Cyber Training Podcast, we deliver eye-opening insights on a recent cybersecurity incident involving the notorious ransomware group LockBit. While the U.S. Federal Reserve remained untouched, Evolve Bank and Trust became their latest target. We'll break down what happened, why it matters, and what it means for the cybersecurity landscape. But that's not all – we also dive into critical CISSP practice questions from Domain 5, focusing on essential concepts like identification, two-factor authentication, and the "something you are" factor in multi-factor authentication (MFA). Sharpen your skills and prepare for your CISSP exam with our expert guidance.
Shifting focus in the latter half, we explore the transformative impact of machine learning algorithms and geofencing policies on cybersecurity. From detecting phishing attempts to adjusting security policies based on geolocation, we delve into how these technologies are revolutionizing threat detection and response. We also tackle the challenges of authenticating IoT devices and discuss the innovative concept of device trustworthiness scores. Plus, the balance between the high-security benefits and privacy concerns of biometric technology is a hot topic. By treating individuals as sensors and leveraging real-time alerts, these advancements are not just enhancing security but also reshaping the very fabric of cybersecurity. Join us as we unpack these complex yet fascinating topics to give you actionable insights for your cybersecurity journey.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Chapitres

1. CISSP Cyber Training Podcast Discussion (00:00:00)

2. Machine Learning Algorithm and Geofencing Policies (00:14:57)

155 episodes

Artwork
iconPartager
 
Manage episode 425894478 series 3464644
Contenu fourni par Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

Send us a Text Message.

Could a seemingly minor breach at a smaller bank signal bigger vulnerabilities in our financial system? On this episode of the CISSP Cyber Training Podcast, we deliver eye-opening insights on a recent cybersecurity incident involving the notorious ransomware group LockBit. While the U.S. Federal Reserve remained untouched, Evolve Bank and Trust became their latest target. We'll break down what happened, why it matters, and what it means for the cybersecurity landscape. But that's not all – we also dive into critical CISSP practice questions from Domain 5, focusing on essential concepts like identification, two-factor authentication, and the "something you are" factor in multi-factor authentication (MFA). Sharpen your skills and prepare for your CISSP exam with our expert guidance.
Shifting focus in the latter half, we explore the transformative impact of machine learning algorithms and geofencing policies on cybersecurity. From detecting phishing attempts to adjusting security policies based on geolocation, we delve into how these technologies are revolutionizing threat detection and response. We also tackle the challenges of authenticating IoT devices and discuss the innovative concept of device trustworthiness scores. Plus, the balance between the high-security benefits and privacy concerns of biometric technology is a hot topic. By treating individuals as sensors and leveraging real-time alerts, these advancements are not just enhancing security but also reshaping the very fabric of cybersecurity. Join us as we unpack these complex yet fascinating topics to give you actionable insights for your cybersecurity journey.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Chapitres

1. CISSP Cyber Training Podcast Discussion (00:00:00)

2. Machine Learning Algorithm and Geofencing Policies (00:14:57)

155 episodes

Tous les épisodes

×
 
Loading …

Bienvenue sur Lecteur FM!

Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.

 

Guide de référence rapide