Cybersecurity and Zero Trust

  Рет қаралды 92,867

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 51
@lucasdealmeidacarotta3174
@lucasdealmeidacarotta3174 2 жыл бұрын
No non-sense, buzzwords, or even hype in this video... Just pure and simple theory . Thanks, guys.
@pradeepvasudevan6468
@pradeepvasudevan6468 2 жыл бұрын
Bob Kalka again. Making it simple without complex jargon!
@biohackingalchemy7996
@biohackingalchemy7996 2 жыл бұрын
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!
@davidjkelly1971
@davidjkelly1971 2 жыл бұрын
Bob is a great presenter! He held my concentration from 0-17:58. Great points and to the point. Great Job Bob!
@Artanis17
@Artanis17 2 жыл бұрын
Studying this topic now and this is the most in depth and clear short video I've seen on the subject, this is great thanks
@diegohernanmaza
@diegohernanmaza 2 жыл бұрын
Great talk Mr Bob Kalka! 18 minutes of pure gold 👌🏽
@oldsport-gaming
@oldsport-gaming 2 жыл бұрын
Absolute gold!, I haven't seen or watched a better cybersecurity video on youtube yet (period).
@1apocalyps
@1apocalyps 2 жыл бұрын
This was a master class introduction to Zero Trust.I did not have to go google random and newly invented buzzword. Thank you!
@Christina-y7z7u
@Christina-y7z7u 14 сағат бұрын
Thank you Bob. 🎉 You da besssst!! 😂 You guys are awesome 🤩
@MarsCityRadio
@MarsCityRadio Жыл бұрын
Absolutely well done! To the point and informative!
@kurtskowronek3572
@kurtskowronek3572 2 жыл бұрын
Well done - +100 to the other comments. This is a logical and pragmatic overview of these ZT trends
@ma34529
@ma34529 11 ай бұрын
Bob crushing it as always, 10/10
@Sara-wb2bs
@Sara-wb2bs Жыл бұрын
Omg, seriously everyone needs to know this! I was building technology from the ground up and our IT engineer ended up being an insider threat. He had all of our passcodes and source codes so in essence he had all of the power to do whatever he wanted including taking our software.
@tannerschumacher67
@tannerschumacher67 2 жыл бұрын
Very interesting and relevant information. Great video, Bob.
@joseluisspagnuolo5732
@joseluisspagnuolo5732 2 жыл бұрын
Great insights Bob!
@AjaySingh-ey7gt
@AjaySingh-ey7gt 25 күн бұрын
Very good explanation 🎉❤
@BDVSecurity
@BDVSecurity Жыл бұрын
great list of additional security measures to the basic ones
@abdusalamyahya789
@abdusalamyahya789 Жыл бұрын
Great Video...Thanks Bob
@mohammedshaik7113
@mohammedshaik7113 2 жыл бұрын
Excellent to the point , loved it.
@QuiChiYang2
@QuiChiYang2 Ай бұрын
A connection between cloud and dedicated local network server, where the network server pings the cloud to verify/est communication. What are the profile specifications to ID individual requesting access?
@javieranayapacheco7646
@javieranayapacheco7646 10 ай бұрын
Great video. Just small comment, it seems he says exactly the same fuction for ID Governance (Users) and AM (Access).
@donasaha1936
@donasaha1936 Жыл бұрын
I loved the vdo , I’m a housewife but have interests in these kind of knowledge. Thank you sir
@shubhamtanwar5341
@shubhamtanwar5341 2 жыл бұрын
The famous Bob of "Alice-Bob examples" in cryptography!
@vdpoortensamyn
@vdpoortensamyn 2 жыл бұрын
Great presentation highlighting what this all means. Can you please indicate which products and solutions help achieve this way of tackling zero trust and cybersecurity?
@kalkabob
@kalkabob 2 жыл бұрын
Sure! For Threat Management/XDR, the 'Find' controls are all handled by IBM QRadar, along with our new aquisition for EDR, Reaqta. For 'Confirm', we leverage Watson, of course. For 'Fix,' we have Cyber Ranges around the world, and the SOAR capability is handled via QRadar SOAR, based on our Resilient acquisition. For the 'User' and 'Access' controls, our Verify portfolio addresses this. For 'Data,' our flagship is Guardium, with an assist to our new Discover and Classify product for that control. For 'Reason,' the Data Risk Insights is via Guardium Insights, Fraud is Trusteer, and Config/Mgmt is MaaS360, with an assist to zScaler for SASE.
@ppvshenoy
@ppvshenoy 2 жыл бұрын
Thank you for a great presentation.
@neiker234
@neiker234 7 ай бұрын
Good explanation! I just have one question: how do you write inverted?
@drkevinsullivan
@drkevinsullivan 2 жыл бұрын
Thanks for the nice overview. Do you have any thoughts on how a small start-up should configure itself for the future, given that tackling all of the dimensions you've noted here is very likely financially impractical. How should we design *now* so as to evolve over time toward a full realization of the concepts you've enumerated here?
@Ahmed-gm8li
@Ahmed-gm8li 2 жыл бұрын
Thank you so much sir ^_^ I have learned a lot from you 🙂
@nicp2327
@nicp2327 2 жыл бұрын
Thank you! :)
@fortzafit-train207
@fortzafit-train207 Жыл бұрын
Quick question, what do you use as that magic whiteboard? It’s an incredible teaching tool!
@IBMTechnology
@IBMTechnology Жыл бұрын
See ibm.biz/write-backwards
@Mike-kq5yc
@Mike-kq5yc 9 ай бұрын
What about Data Integrity in Data?
@brostagni
@brostagni 2 жыл бұрын
Nice and efficient
@mehmoudmirza7057
@mehmoudmirza7057 Жыл бұрын
what kind of interactive screen does the presenter is using in this video ?
@IBMTechnology
@IBMTechnology Жыл бұрын
See ibm.biz/write-backwards
@prione4023
@prione4023 2 жыл бұрын
Richard Gere explaing about Cyber security.....wow.
@kalkabob
@kalkabob 2 жыл бұрын
yikes...thanks? rofl.
@4Q-2Q
@4Q-2Q 2 жыл бұрын
IBM: We have zero trust policy. Me: Why? IBM: why do you ask?
@jackieb6726
@jackieb6726 5 ай бұрын
Did you have to practice writing backwards?? Also thank you!
@LucasTreptow
@LucasTreptow 10 ай бұрын
is anyone gonna comment on the fact that this man is writing backwards with absolutely no issues
@hazabaijan
@hazabaijan Жыл бұрын
Wait a second, is this guy writing backwards on the glass?!😮
@karashevf
@karashevf 6 ай бұрын
22K
@lakshmiprabhakarkoppolu9100
@lakshmiprabhakarkoppolu9100 Жыл бұрын
KZbin feed suggested me to watch this video. I am not sure why this topic is suggested by AI. #SIEM
@MrEmityushkin
@MrEmityushkin 2 жыл бұрын
+Plus
@karashevf
@karashevf 6 ай бұрын
758
@Tooi-1grote-rotzooi
@Tooi-1grote-rotzooi Жыл бұрын
They are stealing my data right now
@a4ldev933
@a4ldev933 Жыл бұрын
well... too much rambling... and no clear definition of what ZT is all about.
@karashevf
@karashevf 6 ай бұрын
758
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 190 М.
«Жат бауыр» телехикаясы І 30 - бөлім | Соңғы бөлім
52:59
Qazaqstan TV / Қазақстан Ұлттық Арнасы
Рет қаралды 340 М.
The History of Zero Trust - Episode 1/3
28:02
Zscaler Inc.
Рет қаралды 811
Understanding and Getting Started with ZERO TRUST
57:11
John Savill's Technical Training
Рет қаралды 137 М.
Understanding the 2024 Updates to the NIST Cybersecurity Framework
59:29
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Zero Trust Explained | Real World Example
21:46
CertBros
Рет қаралды 36 М.
Cybersecurity Modernization
26:29
IBM Technology
Рет қаралды 23 М.
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 184 М.
Understanding Cybersecurity Risk Management
34:55
SANS Security Awareness
Рет қаралды 66 М.