Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

HomeIBM TechnologyCybersecurity Architecture: Five Principles to Follow (and One to Avoid)
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
IBM Security QRadar EDR: https://ibm.biz/Bdyd7k

IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76

This ten-part video series is based on a 400-level course on Enterprise Cybersecurity Architecture taught by Jeff /"the Security Guy/" Crume at a local university. He starts by explaining the basic principles of cybersecurity – five of which are best practices and one is the exact opposite. Subsequent episodes cover the different areas that apply to a well-designed security architecture. Don't forget to subscribe so you'll be notified of the next video!

Get started with IBM Cloud for free → https://ibm.biz/ibm-cloud-sign-up

Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now

#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm

Chapter
00:00 Principles Introduction
01:05 Defense in depth
04:20 Least privileges
07:55 Separation of duties
09:50 Safety by design
12:15 Just do it, stupid (KISS)
14:43 Security through ambiguity

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.