1 00:00:00,05 --> 00:00:01,09 - [Instructor] In this course I've described 2 00:00:01,09 --> 00:00:04,01 some of the most common cybersecurity threats 3 00:00:04,01 --> 00:00:06,03 you're likely to encounter. 4 00:00:06,03 --> 00:00:07,07 To best protect against them, 5 00:00:07,07 --> 00:00:09,09 your next step after watching these videos 6 00:00:09,09 --> 00:00:12,02 would be to figure out which of these threats 7 00:00:12,02 --> 00:00:14,06 apply to your organization. 8 00:00:14,06 --> 00:00:16,05 Then find out if the security controls 9 00:00:16,05 --> 00:00:18,02 for those threats are in place 10 00:00:18,02 --> 00:00:20,05 and apply any that are missing. 11 00:00:20,05 --> 00:00:22,09 By following the recommendations in these videos, 12 00:00:22,09 --> 00:00:26,06 you'll definitely reduce your exposure to these threats. 13 00:00:26,06 --> 00:00:28,07 But the challenge is cyber security threats 14 00:00:28,07 --> 00:00:32,04 keep evolving to overcome even the best defenses. 15 00:00:32,04 --> 00:00:34,00 Just because you're secure today 16 00:00:34,00 --> 00:00:37,09 doesn't mean new threats won't be a problem tomorrow. 17 00:00:37,09 --> 00:00:39,06 So how do you keep up? 18 00:00:39,06 --> 00:00:41,04 Let's look at three actions you can take 19 00:00:41,04 --> 00:00:44,08 to keep ahead of cybersecurity threats. 20 00:00:44,08 --> 00:00:47,01 First, stay up to date with changes 21 00:00:47,01 --> 00:00:49,07 in the cybersecurity threat landscape. 22 00:00:49,07 --> 00:00:52,03 I recommend subscribing to security newsletters 23 00:00:52,03 --> 00:00:56,04 like SANS NewBites and Bruce Schneier's Crypto-gram. 24 00:00:56,04 --> 00:00:58,07 There are a lot of weekly security podcasts 25 00:00:58,07 --> 00:01:00,06 that cover current cybersecurity threats 26 00:01:00,06 --> 00:01:03,08 like Security Weekly News and Defense in Depth. 27 00:01:03,08 --> 00:01:06,02 There are also plenty of cybersecurity magazines 28 00:01:06,02 --> 00:01:08,00 with articles about the latest threats 29 00:01:08,00 --> 00:01:12,05 like Infosecurity Magazine and Cyber Defense Magazine. 30 00:01:12,05 --> 00:01:16,03 Next, to get a more in-depth look at cybersecurity threats, 31 00:01:16,03 --> 00:01:19,02 attend security conferences and seminars. 32 00:01:19,02 --> 00:01:20,09 Presentation topics will often 33 00:01:20,09 --> 00:01:22,09 explore current threats in detail. 34 00:01:22,09 --> 00:01:25,04 Conferences and seminars are also good ways 35 00:01:25,04 --> 00:01:27,02 to connect with security professionals 36 00:01:27,02 --> 00:01:28,07 who have firsthand knowledge 37 00:01:28,07 --> 00:01:31,00 of the latest cybersecurity threats 38 00:01:31,00 --> 00:01:33,03 and how they've dealt with them. 39 00:01:33,03 --> 00:01:36,03 Finally, hire security professionals who specialize 40 00:01:36,03 --> 00:01:39,04 in cybersecurity threat simulation and management. 41 00:01:39,04 --> 00:01:41,02 These include companies and consultants 42 00:01:41,02 --> 00:01:43,03 who conduct penetration tests, 43 00:01:43,03 --> 00:01:46,09 threat modeling, and DDoS simulations. 44 00:01:46,09 --> 00:01:49,09 I hope you use the knowledge you gain from this course 45 00:01:49,09 --> 00:01:52,00 to protect you and your organization 46 00:01:52,00 --> 00:01:56,00 from current and future cybersecurity threats.