Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

HomeIBM TechnologyCybersecurity Architecture: Five Principles to Follow (and One to Avoid)
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
IBM Security QRadar EDR: https://ibm.biz/Bdyd7k

IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76

This ten-part video series is based on a 400-level class on Enterprise Cybersecurity Architecture taught by Jeff /"the Security Guy/" Crume at a local university. He will start by explaining the fundamental principles of cybersecurity: five that are best practices and one that is the exact opposite. Subsequent episodes look at the different domains that apply to a well-designed security architecture. Don't forget to subscribe so you'll be notified of the next video!

Get started with IBM Cloud for free https://ibm.biz/ibm-cloud-sign-up

Subscribe to see more videos like this in the future: http://ibm.biz/subscribe-now

#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm

Chapters
00:00 Principles Introduction
01:05 Defense in depth
04:20 Least privilege
07:55 Separation of duties
09:50 Safe by design
12:15 Keep it simple, stupid (KISS)
14:43 Security due to lack of clarity

Please take the opportunity to connect and share this video with your friends and family if you find it helpful.