1 00:00:00,05 --> 00:00:03,09 - [Marc] Modern cyber attacks are constantly evolving. 2 00:00:03,09 --> 00:00:06,05 Not long ago, internet of things devices 3 00:00:06,05 --> 00:00:09,01 and deep fakes didn't even exist. 4 00:00:09,01 --> 00:00:12,00 Now they're emerging threats that shouldn't be ignored. 5 00:00:12,00 --> 00:00:14,08 This unpredictable change requires organizations 6 00:00:14,08 --> 00:00:17,07 to frequently survey the threat landscape 7 00:00:17,07 --> 00:00:20,08 and reassess the strength of their cybersecurity. 8 00:00:20,08 --> 00:00:21,09 Based on the threats, 9 00:00:21,09 --> 00:00:25,01 your organization may need to invest in new technologies 10 00:00:25,01 --> 00:00:27,08 and implement new security controls. 11 00:00:27,08 --> 00:00:30,06 Hi, my name is Marc Menninger and welcome to my course, 12 00:00:30,06 --> 00:00:33,01 The Cybersecurity Threat Landscape. 13 00:00:33,01 --> 00:00:35,04 I've been leading enterprise security programs 14 00:00:35,04 --> 00:00:37,01 for more than 20 years. 15 00:00:37,01 --> 00:00:40,00 And I'm excited to share with you the latest intelligence 16 00:00:40,00 --> 00:00:43,00 about the shifting cybersecurity threat landscape. 17 00:00:43,00 --> 00:00:44,05 In this course, I'll cover many 18 00:00:44,05 --> 00:00:46,07 of the most common cybersecurity threats. 19 00:00:46,07 --> 00:00:49,09 Plus, some emerging threats you should know about. 20 00:00:49,09 --> 00:00:51,05 I'll also show you ways you can 21 00:00:51,05 --> 00:00:54,00 protect against these threats and share resources 22 00:00:54,00 --> 00:00:56,04 to get more information about them. 23 00:00:56,04 --> 00:00:59,03 Keep in mind that the cybersecurity threat landscape 24 00:00:59,03 --> 00:01:02,01 may be different for different organizations. 25 00:01:02,01 --> 00:01:04,09 If your organization handles a lot of sensitive data, 26 00:01:04,09 --> 00:01:08,02 you're likely to be the target of more cybersecurity threats 27 00:01:08,02 --> 00:01:10,04 than an organization that doesn't. 28 00:01:10,04 --> 00:01:11,06 But it's important to understand 29 00:01:11,06 --> 00:01:13,05 today's threat landscape in any case, 30 00:01:13,05 --> 00:01:15,06 because for every organization, 31 00:01:15,06 --> 00:01:17,04 it's not a matter of if they will be 32 00:01:17,04 --> 00:01:20,07 targeted by one of these threats but when. 33 00:01:20,07 --> 00:01:21,09 If you're ready to explore 34 00:01:21,09 --> 00:01:25,00 the cybersecurity threat landscape, then let's get started.