IT Management Simulation: Cyber Attack!
Overview: Cybersecurity from the CFO's perspective
Cybersecurity at NSF
- What's wrong with you pa$$w0rd? by CMU Professor Lorrie Cranor (17:41)
- Microsoft's XBox hacked by a 5-year-old (10 minutes)
- I Was a Cyberthreat to My Company. Are You? (20 minutes)
- What exactly is encryption (Wall Street Journal)
- The HeartBleed Bug (20 minutes)
- Fired Bernie Sanders aide: I wasn't peeking at Clinton data files
- Computer glitch allows 3,000 inmates early release in Washington state
- 5 most embarrassing software bugs in history
- Defending Your Networks: Lessons from the Pentagon, featuring
Admiral James Winnefeld, former Vice Chairman of the Joint Chiefs of
Staff, Christopher Kirchhoff, Special Assistant to the Chairman of the
Joint Chiefs of Staff, and Professor David Upton of the University of
Oxford’s Saïd Business School (Harvard Business Review)
- The Cybersecurity Challenge of the IoT,
featuring Christopher J. Rezendes, president of INEX Advisors, and
David Stephenson, author of SmartStuff: An Introduction to the Internet
of Things (Harvard Business Review)
Executive summary available here - Edward Snowden at SXSW (1 hour)
An introduction to information security
NSA's hacking chief: Internet of things security keeps me up at night
Privacy by Design is a concept that was developed by the former Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian, back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technologies, and of large–scale networked data systems.
DataLossDB is a database of data breach incidents
Repelling the Cyberattackers by McKinsey
Protecting the enterprise with cybersecure IT architecture
Target appoints new CIO after massive data security breach (10 minutes)
How Malware Can Track Your Smartphone Without Using Location Data
Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections
Data Privacy Lab at Harvard UniversityCybersecurity Framework version 1.0 by NIST
Feds Indict Three in 2011 Epsilon Hack
TV Show: CSI: Cyber
How the HeartBleed Bug works by xkcd.com
Additional References
DIGI Cybersecurity for Business

No comments:
Post a Comment