The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac

  Рет қаралды 372,754

TEDx Talks

TEDx Talks

Күн бұрын

Пікірлер: 140
@Sam-rp4hy
@Sam-rp4hy 5 жыл бұрын
Law 1: if there is a vulnerability, it will be exploited. Law 2: Everything is vulnerable in some way Law 3 :Humans can trust when they shouldn't. Law 4 : with innovation comes opportunity for exploitation. Law 5: when in doubt, see law 1
@jadonbaldwin8311
@jadonbaldwin8311 4 жыл бұрын
Thank you!
@arbibushka9406
@arbibushka9406 4 жыл бұрын
Needed this for an assignment, thank you.
@anetharchard2389
@anetharchard2389 3 жыл бұрын
Well summarised
@meCannon
@meCannon 3 жыл бұрын
And low 34?
@kaceronan1830
@kaceronan1830 3 жыл бұрын
Instablaster
@jackfitzpatrick6863
@jackfitzpatrick6863 6 жыл бұрын
Excellent presentation. Recognizing that "everything is vulnerable" is especially important; to some, this may seem paranoid, but it's best to be proactive in this field. Acknowledge the limitations of existing protective measures, assess them, then present new solutions.
@NickEspinosa
@NickEspinosa 5 жыл бұрын
Thanks, Jack!
@ajbooysen4895
@ajbooysen4895 2 жыл бұрын
This amazing to watch. Nick is a remarkable presenter. I was literally draw in from the first line to the last. Great presentation.
@dinandjait
@dinandjait 5 жыл бұрын
Penn? Is that you?
@NickEspinosa
@NickEspinosa 5 жыл бұрын
That's my night job lol. Thanks!
@jacobl.743
@jacobl.743 5 жыл бұрын
dude I was thinking the same, I was excited to watch Penn talk about cybersecurity
@dorjinphuntsok8271
@dorjinphuntsok8271 4 жыл бұрын
Same question.. penn? Is that you.
@erdemsk3023
@erdemsk3023 4 жыл бұрын
Who is Penn?
@erdemsk3023
@erdemsk3023 4 жыл бұрын
@Student Tyler Pullum Thanks!
@sohatyi
@sohatyi 6 жыл бұрын
I liked this, it's punchy and has an important message without descending into too much jargon.
@NickEspinosa
@NickEspinosa 5 жыл бұрын
Thanks, Jeff! I appreciate the kind words!
@Hadjasillah20
@Hadjasillah20 3 жыл бұрын
456$€
@Hadjasillah20
@Hadjasillah20 3 жыл бұрын
0⁰àaaaaaa00qqqq0q01qqq001111110
@Hadjasillah20
@Hadjasillah20 3 жыл бұрын
Ïa
@jobhuntcoach
@jobhuntcoach 5 жыл бұрын
Such a great presenter.. he makes everything clear and concise
@NickEspinosa
@NickEspinosa 5 жыл бұрын
Thank you! I really appreciate the kind words!
@5710fpilot
@5710fpilot 2 жыл бұрын
@@NickEspinosa I would love to see this updated for 2022.
@IanFaria-Blr-India
@IanFaria-Blr-India 3 жыл бұрын
When we start Thinking like a HACKER... we can start to STOP them. Vulnerabilities will be exploited. It is our duty to see that we are not vulnerable in the cyber world. Excellent talk. Totally enjoyed it.
@rootabeta9015
@rootabeta9015 5 жыл бұрын
Everyone is making fun of this guy for looking like a magician but in reality he's just an ordinary Penntester
@softaildiaries
@softaildiaries 4 жыл бұрын
No he's probably just a ordinary millionaire!
@shadynumbers8561
@shadynumbers8561 3 жыл бұрын
Pen and teller 😂😂😂
@de_minek
@de_minek 3 жыл бұрын
penne tester ? 🍝
@rootabeta9015
@rootabeta9015 3 жыл бұрын
@@de_minek Oh how I wish that were my job title
@VictoriaSobocki
@VictoriaSobocki Жыл бұрын
Hahaha
@PMA65537
@PMA65537 6 жыл бұрын
Allan's laws of security 1 On the whole bad guys can be expected to do what suits them; not what suits you. 2 Once you have a reasonable security policy the amount of good it does is closely related to your willingness to follow it. 3 Security is largely about the question "Who's in control". 4 More restrictive isn't the same as more secure. 5 People offering something that does the impossible are lying.
@lraschellmorton8324
@lraschellmorton8324 5 жыл бұрын
One can trust that one can not trust everyone or/and everything?
@matthijstaback6970
@matthijstaback6970 5 жыл бұрын
I really enjoy Espinosa talking everyone through this so effectively!
@NickEspinosa
@NickEspinosa 5 жыл бұрын
Thanks, Matthijs!
@erhhj5844
@erhhj5844 3 жыл бұрын
In my opinion this listening is very useful. I can hear that millions of times
@nathanb.forrest3406
@nathanb.forrest3406 5 жыл бұрын
I thought that was the magician Penn
@himanshugoel7302
@himanshugoel7302 Жыл бұрын
This is super amazing Nick. Glad to know you and learn from your experience.
@JossOrtan
@JossOrtan 5 ай бұрын
Great talk on cybersecurity, Nick! Your experience is impressive. How do you tailor cybersecurity strategies for different business sizes and industries?
@viralbangetindo
@viralbangetindo 5 жыл бұрын
Where is Teller?
@adarilaxmiprasanna9565
@adarilaxmiprasanna9565 Жыл бұрын
I am very thankful to you sir made my day very interesting and mind peaceful your presentation about cybersecurity and I am got certified certificate in Palo Alto cybersecurity hopefully to explain more about cyber security video
@itz_juliannn6702
@itz_juliannn6702 5 жыл бұрын
I added this to my watch later playlist scrolling through because I thought you were Penn Jillette!!! I was not disappointed!!!
@Rickety3263
@Rickety3263 5 жыл бұрын
Please upload again with louder sound levels. This is barely audible
@gayan4u
@gayan4u 2 жыл бұрын
Law 1: If There Is A Vulnerability, It Will Be Exploited. Law 2: Everything Is Vulnerable in Some Way Law 3 : Humans Trust Even When They Shouldn't. Law 4 : With Innovation Comes, Opportunity For Exploitation. Law 5: When in Doubt, See Law No. 1
@ChetanVithlani
@ChetanVithlani 5 жыл бұрын
Awesome work Nick Espinosa, very useful, simple and effective
@NickEspinosa
@NickEspinosa 5 жыл бұрын
Thanks, Chetan!
@ArifAli-hg1eq
@ArifAli-hg1eq 2 жыл бұрын
Great talk.
@nandinidash5915
@nandinidash5915 6 жыл бұрын
valuable explanation of cyber security.
@robinhood2508
@robinhood2508 3 жыл бұрын
Thank you
@ShiuE577
@ShiuE577 4 жыл бұрын
Law No.3 Human is by default trust and confiding.
@brunazanelli2248
@brunazanelli2248 Жыл бұрын
How much charisma!
@alkatz8292
@alkatz8292 4 жыл бұрын
Very Informative. Thanks Nick
@westinr6278
@westinr6278 5 жыл бұрын
Good talk
@jeremeymanuelpillai1674
@jeremeymanuelpillai1674 3 жыл бұрын
I have to do a report on a cyber attack for my course, which one would you recommend I choose, I would like to research an attack which already has plenty of information surrounding it already.
@8nimnim8
@8nimnim8 2 жыл бұрын
How can I get the texts of this video?
@j6873
@j6873 5 жыл бұрын
That's why you should shred unwanted post/mail because hackers can use your name and address to exploit you. "If there is a vulnerability, it will be exploited."
@steve00alt70
@steve00alt70 5 жыл бұрын
everything can be hacked ignorance isnt an excuse anymore in 2019
@lraschellmorton8324
@lraschellmorton8324 5 жыл бұрын
I think the terms are: coerce and manipulation.
@huh_wtf
@huh_wtf 5 жыл бұрын
I thought it was penn from penn and teller
@ЛіляДякович
@ЛіляДякович 5 жыл бұрын
What is the patented feature of Romad antivirus?
@10snoopy1
@10snoopy1 3 жыл бұрын
I misunderstood trust because I'd be what you call a "mole woman", but I am so glad that I have rediscovered it to learn about cybersecurity threat mitigation techniques
@charlesbyers6911
@charlesbyers6911 5 жыл бұрын
Law number six, if there is a shirt, it will be un-tucked.
@muzso
@muzso 3 жыл бұрын
I'd add to the mix: "the most easily exploitable vulnerability that provides the highest gain (for the attacker) poses the highest threat" (I couldn't get this any shorter :( )
@odesso4625
@odesso4625 5 жыл бұрын
Important!
@franck-ericdaha9653
@franck-ericdaha9653 3 жыл бұрын
I love it
@miriammartinez8370
@miriammartinez8370 4 жыл бұрын
For real I thought it was a magic show.
@Bryan_drums
@Bryan_drums Жыл бұрын
When did Penn Jillette become a cybersecurity expert
@makavellys
@makavellys 2 жыл бұрын
How about the disaster plan that is a part of Cybersecurity? and it's the most important thing???
@user-kn6vw4sr2r
@user-kn6vw4sr2r 3 жыл бұрын
The best way to defend yourself from hackers is to never connect to the internet 😂.
@RainingYayo
@RainingYayo 6 жыл бұрын
Can always spot an IT guy a mile away by the way he dresses lol
@unnamedchannel1237
@unnamedchannel1237 5 жыл бұрын
I don’t dress anything like this?
@theinvisibleworld888
@theinvisibleworld888 5 жыл бұрын
🤣🤣👏
@Ravi-ds7km
@Ravi-ds7km 4 жыл бұрын
or by his weight
@evasion4510
@evasion4510 4 жыл бұрын
but im like a gentleman
@omniyx7837
@omniyx7837 2 жыл бұрын
@@Ravi-ds7km unfunny
@jeromwwhite5577
@jeromwwhite5577 3 жыл бұрын
I'm so tired of changing devices and accounts I'm exhausted I was trying to set up my own business but each email and account and device gets hacked, im not crazy just exhausted, can anyone tell me of securing my account outside of 2fa would really appreciate, kind regards Jerome
@obiesoul8320
@obiesoul8320 4 жыл бұрын
bro bro looks like a bad wizard
@innocentrage1
@innocentrage1 2 жыл бұрын
I thought Penn of Penn and Teller lost weight
@vanavlachopoulou5738
@vanavlachopoulou5738 4 жыл бұрын
Nice
@nikoletaandriopoulou7377
@nikoletaandriopoulou7377 4 жыл бұрын
It seems nice to me too!!
@hmmwhatidoxnottoo8459
@hmmwhatidoxnottoo8459 3 жыл бұрын
Why did you pen without tellers permission creat MNU.
@uccelloarlechio314
@uccelloarlechio314 3 жыл бұрын
5:12 bueno... lo de esos 3 es debatible XD.
@zalvian22
@zalvian22 5 жыл бұрын
Budget penn...
@MrMiss-cp9bw
@MrMiss-cp9bw 5 жыл бұрын
I hope it was one from his family that woo'ed. - That, or the person has to be a -1 year old internet user in his/her 50's.
@IdowuAkinde
@IdowuAkinde 2 жыл бұрын
@janno04
@janno04 Жыл бұрын
*No sabia que Penn también era cyber mago* 😂😂😂😂
@n310ea
@n310ea 5 жыл бұрын
Hacking always starts with bloatware on your computer installed by OEM.
@HarryWizard
@HarryWizard 5 жыл бұрын
Unless you don't have an OEM, and bloatware is hardly hacking
@n310ea
@n310ea 5 жыл бұрын
I don't have OEM, I have Full Version.
@HarryWizard
@HarryWizard 5 жыл бұрын
@@n310ea then you just have a straight up virus lol bloatware wont come with windows 10
@playmodemedia5391
@playmodemedia5391 2 жыл бұрын
most people believe and trust there politicians, world leaders, medicine etc.. without questioning or doing further research or using plain common sense..
@RC-dg7rk
@RC-dg7rk 2 жыл бұрын
Bisognerebbe discurere ore su quanto detto su, comprensione di sicurezza informatica e estremismi della stessa, doveva essere il provider in primis e le case informatiche a garantire privacy e sicurezza base di protezione, tra hacker e pasticcioni pieni di buona volontà non so chi è peggio. Un esempio, una volta come a tanti entrarono dei disperati hacker e ragazzotti di sicurezza informatica nel computer, mentre il mio unico problema, ansia, terrore, preoccupazione, dalla sua entrata alla sua uscita era quello che mi stava rovinando il lavoro di mezza giornata dei fps e crop di un video corso montaggio, e la cpu che non reggeva, vaglielo a spiegare che nemmeno lo consideravo in quanto tale. Quelle questioni credo andrebbero lasciate alle banche postale che sono disinteressati e professionali. Il mito di Gates Jobs i film che vedavamo da giovani vanno presi come grandi esempi per sognare l'imprenditoria informatica tutto lì. Adesso per la banca eventuali pratiche adopero il miglior sistema di sicurezza mai inventato, adopero la carta, però perchè inventare i computer allora?
@pablodavidclavijo4609
@pablodavidclavijo4609 2 жыл бұрын
is he going to make teller disappear or not?
@michaelgoh9439
@michaelgoh9439 3 жыл бұрын
I guess my code that prints hello world is vulnerable
@danman6669
@danman6669 2 жыл бұрын
Depending on how you coded it, it could be.
@eugeniosabater8449
@eugeniosabater8449 6 ай бұрын
Not my secret paper diary with hidden plans!
@norrinradd8923
@norrinradd8923 3 жыл бұрын
I think my speaker just blew right after he spoke......
@thefaltuaadmi
@thefaltuaadmi Жыл бұрын
Well , he has two apples 🍎
@superamario6464
@superamario6464 5 жыл бұрын
Videos with poor mic quality are so annoying. I dont want to hear every slurp or gulp of air. No thanks.
@moazzarts
@moazzarts 2 жыл бұрын
Isn't this the guy who was selling Encyclopedia to Joey in Friends? "Are you the decision maker of the house?"
@johnstephensorita8533
@johnstephensorita8533 2 жыл бұрын
ahhahaha!
@baileym4708
@baileym4708 5 жыл бұрын
Basically exploits are what is hacked and nothing much else to this talk.
@valoric4767
@valoric4767 5 жыл бұрын
Law 3 was about how humans are exploitable. How social engineering is just as a big deal to cyber security as is a vulnerability in software/hardware. Many of the biggest hacks involved someone calling or walking straight into the office/organisation and getting what they needed from gullible employees.
@student702
@student702 5 жыл бұрын
"Illegal" Nuclear Weapons Program?!? By whose definition??? You just lost me.
@i.c.e.7555
@i.c.e.7555 4 жыл бұрын
That’s a massive shirt
@CristobalRuiz
@CristobalRuiz 4 жыл бұрын
...and we are all going to die.
@nehalpal1500
@nehalpal1500 5 жыл бұрын
He concluded good but what was with his dress sense?
@IbrahimIbrahim-pe2kq
@IbrahimIbrahim-pe2kq 5 жыл бұрын
it's actually 4 laws
@alazad816
@alazad816 4 жыл бұрын
Share the government inmauritius.riteinmsmpm.leaders
@trieulieuf9
@trieulieuf9 4 жыл бұрын
3.6b internet users - 700m Chinese internet user, who did not connect to the rest = 2.9b internet users.
@coenet666
@coenet666 2 жыл бұрын
Law 1: buy a suit that fits for god sake.
@danman6669
@danman6669 2 жыл бұрын
He has so much money, I highly doubt he cares.
@installtekzdotcom9777
@installtekzdotcom9777 5 жыл бұрын
I trusted you. I looked under my seat..? :/
@crisisrampage4124
@crisisrampage4124 5 жыл бұрын
One bugger should have took out a 100 bill and shout "hey thanks for this, much appreciated"
@Hermetic_
@Hermetic_ 5 жыл бұрын
Meh 😑
@q.tips6981
@q.tips6981 4 жыл бұрын
🕸️
@lraschellmorton8324
@lraschellmorton8324 5 жыл бұрын
One can trust that one can not trust everyone or/and everything? As a citizen of the United States under God but not an extremist, this is sad. But it is so true from a discerning perception especially in this field and in this day and age (A terrorist era). REPLY
@zemlakgertrude7229
@zemlakgertrude7229 4 жыл бұрын
The lame mass clasically discover because imprisonment likely name in a level success. outgoing, present english
@smg0003
@smg0003 5 жыл бұрын
Bet I can make up some exploitable jargon. Why. Well better be public than be a problem Hacking could have ghost bits. Ie. A heap of zeros turn up at the CPU and some WiFi or backdoor or side-door built in software/hardware add ones where it sees fit to then exploit the program/software & link running. Scary hey. Took me two minutes to think that up. Imagine what's going on truly!!?
@ryderkalaris9745
@ryderkalaris9745 3 жыл бұрын
The yielding captain chemically tow because cloth spontaneously scratch pace a elastic balance. public, giant bull
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
Confessions of a cyber spy hunter | Eric Winsborrow | TEDxVancouver
20:49
You Should Learn How to Hack | Ymir Vigfusson | TEDxReykjavik
16:40
How Falling Behind Can Get You Ahead | David Epstein | TEDxManchester
14:26
Cybersecurity in the age of AI | Adi Irani | TEDxDESC Youth
7:59
The Cyber Skills Gap | Chris Silvers | TEDxElonUniversity
18:47
TEDx Talks
Рет қаралды 117 М.