Channel Avatar

Open Security Summit - Highlights @UCbJ4hmnhgfH8QFA5fF9zgCQ@youtube.com

122 subscribers - no pronouns :c

You've found the Open Security Summit - Highlights Channel —


01:53
Azure OpenAI Service Demo 4
01:07
Limiting Hallucinations of Chat Bots and Language Models
05:28
Using ChatGPT to Explain OWASP Top 10
03:32
Computers and Language
03:57
Why ChatGPT & LLM Matter
01:35
The Most Dangerous Thing About Remote Vehicle
02:17
What is Nudge Theory?
04:19
Language Preference and Fingerprint
02:28
Why AI Still Require Human
02:25
The Dark Side of ChatGPT
02:38
ChatGPT : Friend or Enemy ?
01:22
Vulnerability Management Process
01:57
Prioritisation Aspects of Vulnerability
02:32
The Important Aspects of Reporting
01:42
What is The Objective of Security?
01:26
Why Do We Need Vulnerability Management
03:04
What Are Guardrails?
04:12
Why Do a Cryptography Security Review?
03:19
Equifax Data Breach: Case Study
04:05
What is Cryptography?
02:13
Data Security and Privacy
03:10
How To Measure Progress in Security
08:45
Security Ambassador Program
01:53
Role of Partnership in Security
03:21
Reliability of a System
05:24
Security Breach Landscape
02:27
Why use Canarytokens?
01:19
The Scary Thing in Attack is When You Can't Detect
02:31
Understanding Attackers' Perspective
01:06
Can we identify bad file just with hash?
05:24
Threat Modeling Organization, Team and Processes
02:07
Layer Your Models - Threat Modeling
03:09
The Ultimate Threat Modeling KPI
01:32
Getting buy-in from stakeholders for Threat Modeling
01:43
What should be on your mind as a developer?
01:38
Why Another Talk on Threat Modeling?
01:09
Why is Security Important?
00:41
Why clean Code is Always Better?
01:08
Why We Need to Re-think Security Training Marketing
01:12
Why You Need to go Through the Steps to Build Great Teams
02:29
Why security Trainings are Essential?
02:06
Blockchain is more secure?
01:56
MPC Protocol
01:56
Data Control: Why Cryptographic Distributed Trust is Better
00:43
Is blockchain security broken?
00:58
How do you use blockchain to validate?
02:10
What keeps you awake at night, security wise?
01:51
Do you think security practitioners must be also coder?
02:05
Looking back at BSIMM, what would you say are the top things we can learn from it?
01:16
What is your opinion on the current status of security tools?
02:40
How are you approaching the moving target of Security in ML/A1?
02:16
Companies You Shouldn't Work For In Cybersecurity (Red Flags Companies)
00:45
Why You Need To Always Talk About Your Accomplishments
01:31
Self Learning is the Key in Security (Always Ask Question)
01:02
Why Every Person Has Their Own Role in Cyber Security
01:17
How to Focus and Filter Distraction When Starting A Career in Security
01:26
Can we solve this Problem just with Bodies?
00:57
Probability of Exploitation
01:18
Context is King
01:32
Two Myths That are Quickly Failing