Cargando…

Security superstream : security in the cloud.

Sophisticated (and increasingly frequent) security threats. Complex cloud ecosystems with multiple entry points. And a dearth of cybersecurity talent. Business leaders face a critical need without the means to take care of it. That's why we're presenting this live online event--gathering b...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1350411170
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 221108s2022 xx 113 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCF 
019 |a 1362789435 
024 8 |a 0636920835578 
029 1 |a AU@  |b 000073550301 
035 |a (OCoLC)1350411170  |z (OCoLC)1362789435 
037 |a 0636920835578  |b O'Reilly Media 
050 4 |a Q325.5 
082 0 4 |a 006.31  |2 23/eng/20221108 
049 |a UAMI 
245 0 0 |a Security superstream :  |b security in the cloud. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2022] 
300 |a 1 online resource (1 video file (1 hr., 53 min.)) :  |b sound, color. 
306 |a 015300 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Chloé Messdaghi, Vandana Verma, Nicolas Chaillan, Anastasia Marchenkova, presenters. 
520 |a Sophisticated (and increasingly frequent) security threats. Complex cloud ecosystems with multiple entry points. And a dearth of cybersecurity talent. Business leaders face a critical need without the means to take care of it. That's why we're presenting this live online event--gathering business leaders and industry experts to discuss the developments, trends, and tools you need to know about to create a solid security strategy. The average cost of a cybersecurity breach in the US today is $9.44 million, so the urgency is real. This is an excellent opportunity to get an insider's view of the best ways to protect your organization. About the Security Superstream Series: This three-part series of events will cover some of the most challenging topics facing those who are concerned with security--ransomware and zero trust--with sessions that will get you up to speed on key techniques and best practices for ransomware prevention and mitigation, perimeter security, and more. What you'll learn and how you can apply it Reduce security breaches during your cloud migration with an AppSec program Apply cloud native principles to help your organization move to a zero trust model Use cloud mitigation strategies to avoid the specific risks blockchain and cryptocurrencies face from large-scale quantum computers This recording of a live event is for you because... You're a CISO, CTO, or member of senior management. You brief business executives and leaders on recent security developments. You want to gain a better understanding of how to secure your cloud capabilities and enable digital transformation. Recommended follow-up: Read Alice and Bob Learn Application Security (book) Take Kubernetes Security: Attacking and Defending Kubernetes (video course) Read Digital Fluency: Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation (book) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed November 8, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Cloud computing. 
650 7 |a Cloud computing.  |2 fast  |0 (OCoLC)fst01745899 
650 7 |a Computer crimes  |x Prevention.  |2 fast  |0 (OCoLC)fst00872068 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Instructional films.  |2 fast  |0 (OCoLC)fst01726236 
655 7 |a Internet videos.  |2 fast  |0 (OCoLC)fst01750214 
655 7 |a Nonfiction films.  |2 fast  |0 (OCoLC)fst01710269 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Messdaghi, Chloé,  |e presenter. 
700 1 |a Verma, Vandana,  |e presenter. 
700 1 |a Chaillan, Nicolas,  |e presenter. 
700 1 |a Marchenkova, Anastasia,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920835578/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP