The video is very interesting! Something I don't understand: I have TRC20 USDT in my OKX wallet and I have the recovery phrase: [pride pole obtain together second when future mask review nature potato bulb]. How should I convert them into Bitcoin?
@joelrobert40539 күн бұрын
Just passed CCZT last week and gotta say thats the first course I’ve seen which goes in depth about zero trust or as my company puts it “positive trust”
@Tactical_CyberАй бұрын
Share this everywhere. A brilliant breakdown of where we are....
@sammyfrancisco9966Ай бұрын
Great presentation Swaroop
@mamunshikder-u5fАй бұрын
.You are missing something while uploading the videos Due to which your video is not getting enough expos If you want, I can organically optimize your videos to reach a large number of people,,,
@AlgoNudgerАй бұрын
Thanks.
@mohammadjohur-m7e2 ай бұрын
i must take in some point
@dezmans12 ай бұрын
Great Cyber Security Overview. As an Enterprise Developer, I have learned to appreciate the emphasis in security. I hope that both private and government efforts go towards mitigating security flaws in AI, instead in focusing how AI can reduce cost in the bottom line. I specially liked the point about how open source is 77% of the assembled code these days, hence the never ending patching.
@nestorreveron2 ай бұрын
Thanks
@mikhael007773 ай бұрын
How are these business' going to separate political motivated endeavors such as DEI and ESG financial mandates with what they are using to train their AI models? How are employees going to be protected from business bias in this same, very real, destructive threat? To say there isn't anything like this happening in NGO's and it will not impact generative AI initiatives is obfuscating the truth, looking at Google search engine AI for example; concerning it's Liberal bias for research in topics that should result in differing views but in reality only provides a bias view and actually goes as far as calling out differing views as misinformation, disinformation or malinformation is the main destructive security threat to people. The so called fact checkers are from the very institutions that are promoting their bias. How can we preserve actual truth -vs- agenda driven information, AI is only as good as what it is trained with? Compliance driven information is the key security concern for many in todays online users and it needs to be addressed.
@nestorreveron3 ай бұрын
Thanks
@ConstanceHyman3 ай бұрын
98494 Roslyn Streets
@KenslerCharles-rp9zf4 ай бұрын
Hello my boss and bosses, I congratulate all my citizens who are platforming there, I say THANK YOU THANK YOU for comparisons no already receive us me I say no good me and more the idea, they are able more to support your value for me know that it makes us more thank you very much. Come on, we have a lot of messages there.
@KenslerCharles-rp9zf4 ай бұрын
Yes, we have all of you and I have 6 congratulations for your work. However, there is no more information about the limit for my part, so it does not work and is good.
@deadbyrock-ev5ye5 ай бұрын
I want to apply through my company, how do I get the training provider in South Africa?
@CloudSecurityAllianceDotOrg4 ай бұрын
You can find all the info here: cloudsecurityalliance.org/education/cczt
@rwxrw6 ай бұрын
Taking this soon. Thank you 🙏🏻
@harindamusic6 ай бұрын
No sound!
@DrKaoliN6 ай бұрын
Hm.. no sound.
@sanhananda8727 ай бұрын
Great insights Caleb. Very keen for the part 2 of this. Any ETA on when this might be out?
@csima7 ай бұрын
It is on the to do list.. can't give timeframes but I'm working on it
@digitalmarketingspseoexpert7 ай бұрын
GREAT
@jorgejoelacosta98259 ай бұрын
Congratulations, video excellent.
@thekaysingh9 ай бұрын
SOLID VIDEO...
@MikeMitchell-y3m11 ай бұрын
This should have 1 billion views
@nestorreveron Жыл бұрын
✌️
@friscotecsk8s119 Жыл бұрын
Thank you! Just snagged a voucher and received training material promo code via email. I'm looking forward to getting a better foundational understanding of zero trust.
@CloudSecurityAllianceDotOrg Жыл бұрын
Best of luck!
@friscotecsk8s119 Жыл бұрын
Thanks so much!
@stantkatchenko1341 Жыл бұрын
It is a pity that this conversation lacks comments.. Please let me fix that. I will start with the Pillars work prioritisation. Q: What must be done first? A (Practitioner perspective) - Whatever can be done to address critical risks. For example, if AAA allowing access to some TS data is weak, fix it first. No business owner would allow leaving it on a backburner because of a great a ‘bow-tie’ roadmap. Next step? Assess the small step, learn your lessons and extend. Trainer perspective - it helps to visualise. Let’s imagine an art collector house with a broken window (single factor authentication). Would you replace it with similar or with a double glazed, tempered glass and steel a deadlock (hardware token with a built-in HSM users can only get after retinal scan)? The second option is better but comes a price tag. Practitioner perspective: Price tag is mostly labour. So gained experience would allow repeating the solution for S and even PROTECTED. A bit of a conclusion: Roadmap is very much enterprise specific and must account for most valuable assets, risks and real delivery experience.
@cbesc Жыл бұрын
Thank you, Jason for the examples of metrics and governance. ❤
@farukm7627 Жыл бұрын
Thank you Jim, much appreciated.
@nestorreveron Жыл бұрын
Thanks
@chris_wall Жыл бұрын
How do you compare to tools such as CyCognito?
@jesieniar Жыл бұрын
So like ... Where are the links mentioned in the presentation?
@yamineeshkanaparthy9512 Жыл бұрын
Hello, Sorry for getting back late. Did not notice the comment here. Here is the link to the article - cloudsecurityalliance.org/blog/2023/08/29/machine-learning-for-threat-classification/
@WayneBridgeman Жыл бұрын
Bravo
@ggooden11 Жыл бұрын
Excellent job Caleb ! :)
@r0075h3ll Жыл бұрын
42:23 I think I didn't quite understand the purpose of the privilege LLM in the solution, why do we need another LLM just to transfer the data to the less privileged/quarantined one?
@r0075h3ll Жыл бұрын
Adding to it, can anyone tell me about the scenarios where there'll be a back and forth a.k.a chaining between those two different LLMs?
@th3s3ntry Жыл бұрын
Right on, Sean!! 👊
@mctigue9008 Жыл бұрын
*promosm* ☹️
@techtalkwithkrishan Жыл бұрын
excellent
@JakeKaldenbaugh Жыл бұрын
Caleb, this is a great resource for those of us focused on understanding how LLMs can be deployed into enterprise contexts. One of the most impactful insights of this presentation is idea that there is no distinction between the control plane and the data plane and therefore no way to protect against manipulations of the control plane through the data plane. Great stuff.
@King_Illuminaughti Жыл бұрын
Not practical post-disclosure… plus you’re RACIST & want to put people in CONCENTRATION CAMPS⚡️❌☠️
@nestorreveron Жыл бұрын
Thanks team 🎉
@massivescaleconsulting Жыл бұрын
Thank you Jason for continuing to educate and elevate the state of Zero Trust as a security strategy! Looking forward to the next couple of updates.
@jesieniar2 жыл бұрын
Yeah, so you're grading organization as a whole just by evaluating security is assets that are publicly visible? Not a great idea
@CloudSecurityAllianceDotOrg2 жыл бұрын
Why isn't it a great idea? What's the alternative? Many organizations do publish a STARS entry cloudsecurityalliance.org/star/registry/ but for those that don't how are people supposed to evaluate their security other than by public signals/information?
@jasonbeausoleil24483 жыл бұрын
"Security is not a competitive differentiator." - This. So much this.
@Luke-uz9tw3 жыл бұрын
A lot of potential with this product.
@gsj54 жыл бұрын
Sorry for negative review but this is full of fluff and no technical content at all. This is not what I expect from CSA. Whom do I send a bill for wasting my time?
@CloudSecurityAllianceDotOrg4 жыл бұрын
Thank you for taking the time to offer us your feedback. It's important for us to know what type of content resonates with you. If you are looking for more technical content, you can check out our BrightTalk channel: www.brighttalk.com/channel/10415/ . It contains a wide range of webinars around topics surrounding cloud security. Additionally, you can look at all the free research papers available on our website: cloudsecurityalliance.org/research/artifacts/
@CloudSecurityAllianceDotOrg4 жыл бұрын
Join us on Circle: circle.cloudsecurityalliance.org/home
@capsitan4 жыл бұрын
"A firewall is a device that permits one IP address to another IP address." Hasn't been that way for years with the advent of appID and UserID based rules along with NAC. Has this guy ever configured a firewall?