Cyber Tech & Risk
Cyber Tech & Risk
  • Видео 238
  • Просмотров 146 463
State of Cloud Security in Canada - David Senf (Bell) and Allan Mac Donald (Palo Alto Networks)
"State of Cloud Security in Canada" presented by David Senf (National Cybersecurity Strategist, Bell) and Allan Mac Donald (Systems Engineer, Palo Alto Networks) at Cyber Tech & Risk - Effective Cloud Security virtual event on June 22, 2023.
About Cyber Tech & Risk
Cyber Tech & Risk is the platform for people who care about technology, risk, and security to get fresh ideas, learn the latest skills, identify new opportunities, advance career development, and expand business/professional networks. Visit here to discover more: cybertechrisk.com.
Просмотров: 107

Видео

SSH Security - A Scalable Approach - Kieran Miller, Garantir
Просмотров 68Год назад
SSH is the protocol used to secure access to the most privileged systems in an enterprise. Unfortunately, enforcing security controls like multi-factor authentication (MFA), just-in-time access, device authentication, etc. is challenging and requires the installation and maintenance of software across many SSH servers. In this presentation we will describe a method of centrally enforcing these ...
Panel: The Transformation of IAM
Просмотров 85Год назад
Panel Discussion: The Transformation of IAM presented by Joseph Griffin (Technical Specialist, Security, Compliance, and Identity, Microsoft) and Amol Joshi (Partner, Enterprise Services, CrucialLogics), moderated by Bryan Li (Founder, Cyber Tech & Risk) This panel was presented at Cyber Tech & Risk - Identity Security Summit on May 25, 2023. About Cyber Tech & Risk Cyber Tech & Risk is the pla...
Microsoft Entra - Identity Governance with Lifecycle Workflows - Robin Wenstrom, Microsoft
Просмотров 721Год назад
With Microsoft Entra - Identity Governance solution we will look at one of the new features few know about called Lifecycle Workflows. We will see how we can automate the onboarding and offboarding process for HR and reduce the amount of tickets the IT Helpdesk gets to create user accounts and provide all the memberships needed. This talk was presented by Robin Wenstrom (Technical Specialist - ...
Want Security? Think Identity! - Dorin Gherghelegiu, Accenture
Просмотров 102Год назад
As the world becomes more digital, this is an increasingly important concept for business and individuals to adopt. While identity protects and controls access to data, systems, services, buildings and computers it needs its own security. We’ll explore how identity facilitates security but also what makes identity secure and what doesn’t. This talk was presented by Dorin Gherghelegiu (National ...
Combatting Risky Behavior in the Cloud - Neil Walker, Microsoft
Просмотров 43Год назад
Modern infrastructure has brought great benefits to organizations - but inadvertently created a new attack surface that did not exist until organizations shifted to the cloud. Over 40K permission exist across the key cloud platforms, and nearly 50% are estimated to be high-risk because they could cause catastrophic damage if used improperly. We will discuss how these risks can be mitigated with...
Approach to a Safe Architecture - Nicolas Buache, Microsoft
Просмотров 73Год назад
"Approach to a Safe Architecture" presented by Nicolas Buache (Cloud Solution Architect, Security, Microsoft) at Cyber Tech & Risk - Securing IoT virtual event on March 23, 2023. About Cyber Tech & Risk Cyber Tech & Risk is the platform for people who care about technology, risk, and security to get fresh ideas, learn the latest skills, identify new opportunities, advance career development, an...
Panel: Effective Cybersecurity Architecture
Просмотров 177Год назад
Panel Discussion: Effective Cybersecurity Architecture presented by Nicolas Buache (Cloud Solution Architect, Security, Microsoft), Maxime Coquerel (Director, Cloud Security Architecture, RBC), and Marcos Santiago, Enterprise Information Security Architect, moderated by Bryan Li (Founder, Cyber Tech & Risk) This panel was presented at Cyber Tech & Risk - Cybersecurity Architecture virtual event...
Panel Discussion: Securing IoT
Просмотров 95Год назад
Panel Discussion: Securing IoT presented by Dmitry Raidman (CTO, Cybeats), Patrick Miller (CEO, Ampere Industrial Security), Kirsten Turnbull (Technical Specialist, Security & Compliance, Microsoft), moderated by Ishika Sahni (Master of Engineering Graduate, University of Guelph) This panel was presented at Cyber Tech & Risk - Securing IoT virtual event on March 23, 2023. About Cyber Tech & Ris...
Securing IoT - Uniting OT & IT for Smarter, more Secure Future
Просмотров 76Год назад
"Securing IoT - Uniting OT & IT for Smarter, more Secure Future" presented by Kirsten Turnbull (Technical Specialist, Security & Compliance, Microsoft) and Jharana Luitel (Technical Specialist, Microsoft) at Cyber Tech & Risk - Securing IoT virtual event on March 23, 2023. About Cyber Tech & Risk Cyber Tech & Risk is the platform for people who care about technology, risk, and security to get f...
Efficient Compliance Enablement for DevOps Operating Model - Somasundaram Subbu, CSTREAM.IO
Просмотров 64Год назад
With the evolution of DevOps and Security Automation, we have successfully built mechanisms to integrate security as part of the product development process in a DevOps operating model. However, compliance and audit readiness are still considered a checkbox activity and pushed at the tail-end of the product development lifecycle. This often leads to building the application twice to meet the co...
Panel Discussion: Data Security
Просмотров 91Год назад
Panel Discussion: Data Security
Security Automation: The future of digital economy - Poonam Mishra, Microsoft
Просмотров 92Год назад
As we move towards a digital economy, adopting cybersecurity practices becomes more important for businesses. However, cybersecurity is not just about defending against cyber-attacks. It is also about protecting data from being leaked accidentally or system errors. With the rise of artificial intelligence and machine learning technologies, organizations can now automate many of the tasks done m...
Data Protection & Privacy: protecting a human right - Radu Vaduva, Microsoft
Просмотров 26Год назад
Data Protection & Privacy: protecting a human right - Radu Vaduva, Microsoft
Panel - Automation for Security Operations
Просмотров 70Год назад
Panel discussion of Automation for Security Operations at Cyber Tech & Risk - Security Automation Conference on February 16, 2023. Panel Speakers: • Amol Joshi, Partner, Enterprise Services, CrucialLogics • Sasha Lebovic, Security and Compliance Specialist, Microsoft • Farooq Naiyer, Global Head of Technology and Cyber Assurance, Munich Re Panel Moderator: • Bryan Li, Founder, Cyber Tech & Risk...
Continuously Improving the Capability of Human Defenders with AI - Tahseen Shabab, Penfield.AI
Просмотров 141Год назад
Continuously Improving the Capability of Human Defenders with AI - Tahseen Shabab, Penfield.AI
Panel - Automation for Identity and Access Management
Просмотров 150Год назад
Panel - Automation for Identity and Access Management
Unleashing the Power of ChatGPT in Security Operations - Chris Stelzer, Microsoft
Просмотров 2 тыс.Год назад
Unleashing the Power of ChatGPT in Security Operations - Chris Stelzer, Microsoft
How over reliance on DLP is hurting your data protection efforts - Daniel Cybulskie, Zscaler
Просмотров 40Год назад
How over reliance on DLP is hurting your data protection efforts - Daniel Cybulskie, Zscaler
Cloud Detection and Response, Closing the Visibility Gap - Christopher Fielder, Artic Wolf
Просмотров 132Год назад
Cloud Detection and Response, Closing the Visibility Gap - Christopher Fielder, Artic Wolf
Securing Cloud Workloads and Resources - Jumoke Ajidahun, Microsoft
Просмотров 36Год назад
Securing Cloud Workloads and Resources - Jumoke Ajidahun, Microsoft
Panel Discussion: Cloud Detection and Response
Просмотров 122Год назад
Panel Discussion: Cloud Detection and Response
Panel Discussion: Data Governance and Privacy
Просмотров 218Год назад
Panel Discussion: Data Governance and Privacy
Recognize sensitive and personal data and protect privacy - Raushan Dilruba, Microsoft
Просмотров 54Год назад
Recognize sensitive and personal data and protect privacy - Raushan Dilruba, Microsoft
You’re going to need a bigger boat - the reality of phishing, Oren J. Falkowitz, Cloudflare
Просмотров 100Год назад
You’re going to need a bigger boat - the reality of phishing, Oren J. Falkowitz, Cloudflare
Panel Discussion: Phishing Protection
Просмотров 37Год назад
Panel Discussion: Phishing Protection
Cloud Security Posture Ninja: Assessing cloud security posture like a pro - Vishal Patel, KPMG
Просмотров 231Год назад
Cloud Security Posture Ninja: Assessing cloud security posture like a pro - Vishal Patel, KPMG
Protecting Your Resources in the Cloud - Nehal Shah, Microsoft
Просмотров 63Год назад
Protecting Your Resources in the Cloud - Nehal Shah, Microsoft
Panel Discussion: Multi Cloud Management
Просмотров 95Год назад
Panel Discussion: Multi Cloud Management
Trust but Verify - Verifying Security Controls in the Public Cloud - Ihor Kravchuk, RBC
Просмотров 122Год назад
Trust but Verify - Verifying Security Controls in the Public Cloud - Ihor Kravchuk, RBC

Комментарии

  • @genjimccorkle5518
    @genjimccorkle5518 Месяц назад

    Uhhhhhhhhhh!!!

  • @22nlatitude
    @22nlatitude 2 месяца назад

    There’s no age of a man in which a ponytail looks acceptable.

  • @shadrachwilson1211
    @shadrachwilson1211 5 месяцев назад

    This is good information. I was nervous for the guy a little bit. But he handled it well

  • @AdarshMaddy
    @AdarshMaddy 6 месяцев назад

    Except the answers, the questions are gold

  • @azukaabrahamnduka5242
    @azukaabrahamnduka5242 10 месяцев назад

    Am interested

  • @CyberHAC100k
    @CyberHAC100k Год назад

    This is a great moc interview

  • @TylerWootan
    @TylerWootan Год назад

    Why are all 4 of the people constantly interrupting and talking over each other? Take a breath 😅

  • @chrisaustin6255
    @chrisaustin6255 Год назад

    With passwords, long is better than strong

  • @alcapuccino
    @alcapuccino Год назад

    Nice video and system outtage

  • @cheviot2988
    @cheviot2988 Год назад

    I have faith that this man, if given an opportunity with correct training would rise above the expectations required off him, he did this interview while being filmed, this is really an intense experience for him and he allowed it to get put on the internet for all to see, he 100% has potential, I wonder what he is doing now!

  • @ChaseFace
    @ChaseFace Год назад

    If you have good soft skills like a clear speaking voice, confidence, are articulate, etc. you’ll be much more professional in appearance than your usual awkward, stammering, hunched over programmer that looks like they’re about to soil themselves at the prospect of interact with another human. Customer service is something you can’t inherently be proficient at.

  • @BD90..
    @BD90.. Год назад

    You can see the guy was not as prepared as he could be and clearly nervous. The more prepared you are the more confident you will be. Big mistake not having questions for them at the end.

  • @millerma08
    @millerma08 2 года назад

    Too many UUuuuMMmmmmms

  • @rubinkc
    @rubinkc 2 года назад

    This is really useful. Thank you.

  • @Moose185
    @Moose185 2 года назад

    This is a good video showing a mock interview, you can totally see what mistakes he makes, quite similar to my interviews.

  • @lonelygoner2012
    @lonelygoner2012 2 года назад

    to say to the candidate he was boring, i dont know about that

  • @0xIAMROOT
    @0xIAMROOT 2 года назад

    Interviewee did well! Nothing he can’t work on. Great job guys!

  • @PlayaX01
    @PlayaX01 2 года назад

    he didnt get the job. theyre gonna says he doesn't have enough "eXpErIeNcE" and it didnt seem like a good "fit" whatever all that means. Id hire him though

    • @Moose185
      @Moose185 2 года назад

      He was a bit vague on some questions to be honest, he could brush up on his interview skills. Like for example when asked about coding on a project he could only name RCA and not the other two coding languages. Questions like this are to see if you actually did what you say, the fact he forgets information never goes well in an interview.

  • @bantuandproud8456
    @bantuandproud8456 2 года назад

    This is the purest definition ever!

  • @bantuandproud8456
    @bantuandproud8456 2 года назад

    I always underestimate myself about "cyber security field " because I don't have college degrees on that only certifications in many security courses and after this watching this interview I realized that nothing was difficult to me in all the questions they asked. This restored my confidence.

  • @allset5435
    @allset5435 2 года назад

    Thank you for the great information. It's very helpful.

  • @matzesurer7884
    @matzesurer7884 2 года назад

    Are you from india?

  • @usmanwadud8513
    @usmanwadud8513 2 года назад

    Hired.

  • @ksaifu
    @ksaifu 2 года назад

    This is just GOLD!!

  • @BinarySec
    @BinarySec 2 года назад

    really informative

  • @randommercedesmgtow3675
    @randommercedesmgtow3675 3 года назад

    So it seems you can't have a 100% risk free?

  • @TheeMelloMan
    @TheeMelloMan 3 года назад

    This is the best mock interview video. Mostly bc it didn't feel like a setup.

  • @booo_e
    @booo_e 3 года назад

    Is there a timestamp for each question ?

  • @randommercedesmgtow3675
    @randommercedesmgtow3675 3 года назад

    Is looks real

  • @cottondai
    @cottondai 3 года назад

    RUclips algorithm is awesome I am looking for cyber interviews and I get one. Thank you.

  • @dmhogan4239
    @dmhogan4239 3 года назад

    This doesn’t seem like a mock interview - the person being interviewed appeared to be genuinely nervous. *He* was experiencing it as a real interview.

    • @manfrombritain6816
      @manfrombritain6816 3 года назад

      i'm guessing that the 3 interviewers were guests or supervisors who took on the role of interviewers, so in a way its kind of real?

    • @leonel1717
      @leonel1717 2 года назад

      Perhaps method actors.

    • @kenzolionel8674
      @kenzolionel8674 2 года назад

      sorry to be so offtopic but does anybody know of a trick to log back into an Instagram account? I stupidly lost the login password. I appreciate any tips you can give me!

    • @khalidray9117
      @khalidray9117 2 года назад

      @Kenzo Lionel instablaster :)

    • @kenzolionel8674
      @kenzolionel8674 2 года назад

      @Khalid Ray Thanks for your reply. I found the site on google and Im trying it out atm. I see it takes quite some time so I will get back to you later when my account password hopefully is recovered.

  • @kevinkinsella7815
    @kevinkinsella7815 3 года назад

    Nice!

  • @qutaybausman7161
    @qutaybausman7161 3 года назад

    but this was 37 minutes long.

  • @kevinkinsella7815
    @kevinkinsella7815 3 года назад

    Nice! Very good information

  • @fatherfigure2766
    @fatherfigure2766 3 года назад

    I wish he had went over salary negotiating process more when he said sometimes they try to force down

    • @StrifeHale
      @StrifeHale 3 года назад

      @Jett Raul fakin idiot with promotions.

    • @StrifeHale
      @StrifeHale 3 года назад

      @Marlon Clay another idiot with a bot account.

  • @ParasolPat
    @ParasolPat 3 года назад

    "Clearly you aren't addressing the main problem" ...... not getting hired.

    • @andresnow259
      @andresnow259 3 года назад

      This guys not great at interviews

    • @tanveersingh5423
      @tanveersingh5423 3 года назад

      Not unless the interviewer was actually not mentioning something on purpose to check whether the interviewee catches it or not

  • @indrakumari1854
    @indrakumari1854 3 года назад

    I also want your contact bz of my project

  • @surinderkakar1926
    @surinderkakar1926 3 года назад

    This was amazing. Very knowledgeable

  • @linxploit
    @linxploit 4 года назад

    thank you. waiting for more videos like this

  • @DGI5
    @DGI5 4 года назад

    Great information!

  • @UnderseaAdventures
    @UnderseaAdventures 4 года назад

    Hey Antoine! Long time since you have been to Boston, buddy. :)

  • @ilonatamasi2624
    @ilonatamasi2624 4 года назад

    great video, love how he explains things in a simple terms!

  • @GrandLunaCompany_rl
    @GrandLunaCompany_rl 4 года назад

    can i get your contact ? i have a project for my industry and i need to know if i can get the software what can developer my idea

  • @SA-ls7cv
    @SA-ls7cv 4 года назад

    The first guy did everything! Fak

  • @cydef
    @cydef 4 года назад

    Nice work Steve!

  • @educationgyanpragati4078
    @educationgyanpragati4078 4 года назад

    6 lk Dn Vps pls

  • @darkmatter8650
    @darkmatter8650 4 года назад

    HEY! GUYS ! WANT to KEEP BOTH REAL TIME OF WINDOWS DEFENDER AND ESET SMART SECURITY ON TOGETHER -WHAT CAN I DO ? RESPONSE ASAP!

  • @salman80
    @salman80 4 года назад

    12:20 can someone answer the question and explain what answer they are looking for. I feel like the 2nd interviewer with glasses messed up his question a bit.

    • @abdullahiahmed6341
      @abdullahiahmed6341 4 года назад

      I would say try to feel for the subnet. Capture the traffic on the localhost and analyze the packets especially the broadcasts. You can get information like protocol versions in use, domain names, etc.

    • @salman80
      @salman80 4 года назад

      @@abdullahiahmed6341 The one with glasses interrupted the question and said you can't use any nmap or other packet capturing tool😓 maybe its a valid question idk. Thanks alot for your help

    • @JoseCastilloStronghold
      @JoseCastilloStronghold 4 года назад

      i believe they wanted him to go step by step, IE, check what ip range im on, then map the arp table, then check mac addresses so you can identify what device it's, a switch, pc, router, phone or whatever, you can also get the hostnames if they have, and then nmap the interesting machines, and go on...

    • @alzain55a
      @alzain55a 3 года назад

      Here we talking about L1L2 attack we try to sniff data from switching the port are connected and we use tool call yersinia to andd our port to Vlan and deceiver the VLNs and SW MGT IP General we do reconnaissance

  • @hernancoronel
    @hernancoronel 4 года назад

    Sound is totally annoying.

  • @BobbyBigDude
    @BobbyBigDude 4 года назад

    Hes not providing examples or using terminology on how he would go about certain protocols. Its not a step by step process in which there is sufficient or in-depth responses from the interviewee.