Channel Avatar

SecureWorld @UCWFHeXd6xv1t6zsB6xAWnmQ@youtube.com

464 subscribers - no pronouns :c

SecureWorld is a premier source of cybersecurity educational


09:38
William Lidster interviewed in SecureWorld's Spotlight Series
07:53
Brittany George interviewed in SecureWorld's Spotlight Series
06:59
Shawn Tuma interviewed in SecureWorld's Spotlight Series
06:22
Zachary Lewis interviewed in SecureWorld's Spotlight Series
08:37
Reanna Schultz interviewed in SecureWorld's Spotlight Series
06:58
Tony Masgio interviewed in SecureWorld's Spotlight Series
07:11
Maria Graham interviewed in SecureWorld's Spotlight Series
04:19
Mike Reterstorf interviewed in SecureWorld's Spotlight Series
04:52
Mo Wehbi interviewed in SecureWorld's Spotlight Series
36:35
Guardians of the Ballot Box: Cybersecurity in Elections
56:44
AI Governance - a Balancing Act
59:31
BEC Attacks, Pig Butchering, and What the Secret Service Wants You to Know
48:57
Manage AI Risk to Let Innovation Prosper
01:07:23
Cyber Debriefing for April / May of 2024
54:48
Cyber Debrief on AI - July 2024
01:02:19
Ask a Lawyer Part 3
50:40
Insider Threat and AI with Mike Muscatell
01:04:30
Ask A Lawyer Part 2
01:13:15
The Life of the Party - Third Party Risk Management. With the folks from Whistic.
01:02:27
RaaS Attackers: How They Work—and How You Can Fight Back
01:15:22
BEC Attacks, the FBI and the new IC3 Report
01:50:38
State of the Phish Report 2022
31:00
Should Ransomware Payments Be Banned?
29:03
Oil and Natural Gas Cyber Threats
45:03
Youth and Cybercrime
42:56
The CMMC Explained
39:22
New National Cyber Power Index
31:24
The Future of Cloud Security
16:08
Big Data: How Do You Assess Explicit Risk & Trust Levels in the Enterprise?
16:35
Using Threat Intelligence to Strengthen Security Awareness
17:15
Bruce Schneier: The Market = (In)security
24:50
The Enterprise Business Model of Cybercrime
13:05
Being a Young Woman in Security: What It's Like
33:16
Cybersecurity Burnout Solutions
30:55
Cybersecurity Burnout and Mental Health
25:43
The Link: Cyber Insurance and Incident Response
37:24
Zoom, Remote Tools, Privacy, and Cybersecurity
57:14
Cybersecurity, Geopolitics, and the Threat Landscape
44:51
COVID-19 Contact Tracing: Privacy and Cybersecurity Problems
33:18
New Cybersecurity Lessons from the Pandemic
18:59
How to secure third-party remote access
00:54
Identity, Authentication, and the Remote Workforce
00:39
Product Demos Speed Dating: Swipe Right or Left?
00:43
The Private Life of Data: Using It to Improve Data Usage, Governance, and Compliance
00:59
Vulnerability Management: Time to Step Things Up!
00:59
Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercrime
00:59
Locking Down Unmanaged IoT Endpoints: Secure the New Frontier of Industrial IoT
00:54
The High Stakes of Cyber Burnout
00:42
Product Demo Speed Dating: Swipe Right or Left?
00:59
Attacking the Modern API-Based Web Application
00:59
Managing Third-Party Cyber Risks During COVID-19
00:59
Panel: Cloud for the Win!
00:54
The Pandemic of Ransomware: How Cybercriminals React to the Chaos
00:54
Zero to 60: Making Security Programmatic and Cultural at Princeton University
00:43
How the New Remote Workforce Changes Data Security
00:59
Incident Response Panel: The Devil Is in the Details
00:59
Cyber Attacks and Reputation Risk: Is Your Organization Prepared?
00:49
Product Demo Speed Dating: Swipe Right or Left?
00:49
Resilience and Innovation: Moving Beyond the Pandemic
00:49
Cloud Compliance Considerations among COVID-19