[ Silence ] >> Good afternoon. My name is David Relman, I am co-director of the Center for International Security and Cooperation, known as CISAC at the Freeman Spogli Institute for...
[ MUSIC ] POWERS: Welcome to This Week on developerWorks. I'm your host, Calvin. If you've ever given a website or an application permission to post things to Twitter stream on your...
Well, cyber security to me is the next phase of computer networking. When I started in this field in the 1980's the internet was invented. I was born before the internet and my first job was...
[ Music ] I want to weave in a little bit of the legal perspective as well from the perspective of the Federal Trade Commission. I was the head of Consumer Protection at the FTC from 2001 to 2004, and...
Elevated Privileges Today I’d like to speak about Elevated Privileges. These are permissions on your workstation that allow you to perform configuration changes or other advanced functions on your...
Hello, my name is Philip Reitinger and I'm a Deputy Undersecretary here at the Department of Homeland Security and the Director of the National Cybersecurity Center. At DHS we have a huge...
Hello. I'm a research analyst at a cybersecurity firm. I'm also one of the co-founders of Inspyre and the main blogger for the Inspyre blog, but I also like like to do ballroom...
>> STATE LEADERS TESTIFIED YESTERDAY BEFORE MEMBERS OF THE US SENATE COMMITTEE ON SMALL BUSINESS AND ENTREPRENEURSHIP AT A FIELD HEARING IN LAUREL YESTERDAY, TO DISCUSS THE ROLES SMALL...

1

annotations

[ Music ] >> Why isn't it in all career fields? It's not that you just would get a degree in cybersecurity. If your degree is in education, there needs to be a...
[ Music ] >> The professional winner, first place, UMUC's pro team. [ Cheering and Applause ] First place in the collegiate division for the cyber challenge, UMUC Cyber Team Two....

1

annotations