Тёмный

Cost of a Data Breach 2024 Trends 

IBM Technology
Подписаться 883 тыс.
Просмотров 12 тыс.
50% 1

Опубликовано:

 

20 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 21   
@osamaexking
@osamaexking 2 месяца назад
Excellent video and very informative. My organization was recently affected by a Data breach, and it took them around 5 months to discover it, so I am now surprised to see that the average of discovery of a breach is 200 days. I thought my organization had a lackluster cyber security measures but the root-cause of the breach was a 0-day exploit that affected other companies as well.
@jeffcrume
@jeffcrume 2 месяца назад
Thanks for sharing your experience. Five months is still too long. It’s just that most people are even worse
@BN-qv5he
@BN-qv5he 2 месяца назад
As a new cyber student I find these videos incredibly informative and well presented. Great job!!
@jeffcrume
@jeffcrume 2 месяца назад
Thanks so much for saying so and best of luck to you in your studies!
@ThreatWatch
@ThreatWatch 21 день назад
This is an eye opener and insightful , It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of Cost of a Data Breach 2024 Trends
@samiaamin43
@samiaamin43 2 месяца назад
Outstanding delivery as always Jeff!! It is unfortunate to see the numbers of date breach still on the rise but you did predict it with the rise of AI. I feel like the cybersecurity field is experiencing a fatigue currently with the constant update of new tools and ways to exploit systems not to mention AI.
@jeffcrume
@jeffcrume 2 месяца назад
Thank you for the kind words! Yes, unfortunately, the bad guys never quit so the arms race continues…
@aztronomy7457
@aztronomy7457 2 месяца назад
Hey Jeff, what cybersecurity books do you recommend?
@jeffcrume
@jeffcrume 2 месяца назад
I wrote one 24 years ago that is still mostly accurate but the examples are dated (“What Hackers Don’t Want You to Know”). Otherwise, most anything by Bruce Schneier is going to be excellent
@jaidenrichard99
@jaidenrichard99 2 месяца назад
I always learned a lot from his lecture. Thanks.
@jeffcrume
@jeffcrume 2 месяца назад
Thanks for saying so!
@sk3ffingtonai
@sk3ffingtonai 2 месяца назад
Thank you.
@scesarsilveira9050
@scesarsilveira9050 2 месяца назад
Excellent intel!!
@jeffcrume
@jeffcrume 2 месяца назад
Glad you liked it!
@sunniglory514
@sunniglory514 2 месяца назад
Why not use the median cost of a breach?
@jeffcrume
@jeffcrume 2 месяца назад
I haven’t seen that data but I suspect it’s pretty similar given the large number of data points
@Jackson-l3r
@Jackson-l3r 2 месяца назад
If the state enforces centralized systems while being aware of their inherent vulnerabilities that can never be fully secured, there should be a mechanism to hold it accountable. The state has a responsibility to protect its citizens' data and ensure their privacy. If it fails to do so, especially with prior knowledge of the risks, it could face legal and ethical scrutiny. Accountability could come through legal action, policy reforms, and public pressure, demanding that the state improve its data protection measures and transparency.
@shaileshyadav5573
@shaileshyadav5573 2 месяца назад
Nice info
@drewberry5737
@drewberry5737 2 месяца назад
Are you writing backwards?
@jeffcrume
@jeffcrume 2 месяца назад
I only wish I could. Search this channel for “how we make them” and you’ll learn the trick
Далее
What’s your height?🩷🙀💚
00:59
Просмотров 3,4 млн
aespa 에스파 'Whiplash' MV
03:11
Просмотров 11 млн
How do Graphics Cards Work?  Exploring GPU Architecture
28:30
How One Line of Code Almost Blew Up the Internet
13:47
Cybersecurity Architecture: Networks
27:31
Просмотров 134 тыс.
Cybersecurity Architecture: Response
16:57
Просмотров 39 тыс.
What’s your height?🩷🙀💚
00:59
Просмотров 3,4 млн