Cybersecurity and Zero Trust

Поделиться
HTML-код
  • Опубликовано: 12 янв 2025

Комментарии • 50

  • @lucasdealmeidacarotta3174
    @lucasdealmeidacarotta3174 2 года назад +48

    No non-sense, buzzwords, or even hype in this video... Just pure and simple theory . Thanks, guys.

    • @pradeepvasudevan6468
      @pradeepvasudevan6468 2 года назад +2

      Bob Kalka again. Making it simple without complex jargon!

    • @biohackingalchemy7996
      @biohackingalchemy7996 2 года назад +2

      the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Im baffled they are trying to pass this off as something new. We have been doing it for 22 years!

  • @davidjkelly1971
    @davidjkelly1971 2 года назад +8

    Bob is a great presenter! He held my concentration from 0-17:58. Great points and to the point. Great Job Bob!

  • @diegohernanmaza
    @diegohernanmaza 2 года назад +29

    Great talk Mr Bob Kalka! 18 minutes of pure gold 👌🏽

  • @Artanis17
    @Artanis17 2 года назад +3

    Studying this topic now and this is the most in depth and clear short video I've seen on the subject, this is great thanks

  • @1apocalyps
    @1apocalyps 2 года назад +5

    This was a master class introduction to Zero Trust.I did not have to go google random and newly invented buzzword. Thank you!

  • @oldsport-gaming
    @oldsport-gaming 2 года назад +1

    Absolute gold!, I haven't seen or watched a better cybersecurity video on youtube yet (period).

  • @kurtskowronek3572
    @kurtskowronek3572 2 года назад +1

    Well done - +100 to the other comments. This is a logical and pragmatic overview of these ZT trends

  • @MarsCityRadio
    @MarsCityRadio Год назад +1

    Absolutely well done! To the point and informative!

  • @Sara-wb2bs
    @Sara-wb2bs Год назад

    Omg, seriously everyone needs to know this! I was building technology from the ground up and our IT engineer ended up being an insider threat. He had all of our passcodes and source codes so in essence he had all of the power to do whatever he wanted including taking our software.

  • @tannerschumacher67
    @tannerschumacher67 2 года назад +3

    Very interesting and relevant information. Great video, Bob.

  • @joseluisspagnuolo5732
    @joseluisspagnuolo5732 2 года назад +3

    Great insights Bob!

  • @ma34529
    @ma34529 11 месяцев назад

    Bob crushing it as always, 10/10

  • @QuiChiYang2
    @QuiChiYang2 Месяц назад

    A connection between cloud and dedicated local network server, where the network server pings the cloud to verify/est communication. What are the profile specifications to ID individual requesting access?

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt 14 дней назад

    Very good explanation 🎉❤

  • @BDVSecurity
    @BDVSecurity Год назад

    great list of additional security measures to the basic ones

  • @abdusalamyahya789
    @abdusalamyahya789 11 месяцев назад

    Great Video...Thanks Bob

  • @mohammedshaik7113
    @mohammedshaik7113 Год назад

    Excellent to the point , loved it.

  • @javieranayapacheco7646
    @javieranayapacheco7646 9 месяцев назад

    Great video. Just small comment, it seems he says exactly the same fuction for ID Governance (Users) and AM (Access).

  • @vdpoortensamyn
    @vdpoortensamyn 2 года назад +2

    Great presentation highlighting what this all means.
    Can you please indicate which products and solutions help achieve this way of tackling zero trust and cybersecurity?

    • @kalkabob
      @kalkabob 2 года назад +2

      Sure! For Threat Management/XDR, the 'Find' controls are all handled by IBM QRadar, along with our new aquisition for EDR, Reaqta. For 'Confirm', we leverage Watson, of course. For 'Fix,' we have Cyber Ranges around the world, and the SOAR capability is handled via QRadar SOAR, based on our Resilient acquisition. For the 'User' and 'Access' controls, our Verify portfolio addresses this. For 'Data,' our flagship is Guardium, with an assist to our new Discover and Classify product for that control. For 'Reason,' the Data Risk Insights is via Guardium Insights, Fraud is Trusteer, and Config/Mgmt is MaaS360, with an assist to zScaler for SASE.

  • @donasaha1936
    @donasaha1936 Год назад

    I loved the vdo , I’m a housewife but have interests in these kind of knowledge. Thank you sir

  • @shubhamtanwar5341
    @shubhamtanwar5341 Год назад

    The famous Bob of "Alice-Bob examples" in cryptography!

  • @neiker234
    @neiker234 6 месяцев назад

    Good explanation! I just have one question: how do you write inverted?

  • @drkevinsullivan
    @drkevinsullivan 2 года назад

    Thanks for the nice overview. Do you have any thoughts on how a small start-up should configure itself for the future, given that tackling all of the dimensions you've noted here is very likely financially impractical. How should we design *now* so as to evolve over time toward a full realization of the concepts you've enumerated here?

  • @ppvshenoy
    @ppvshenoy 2 года назад

    Thank you for a great presentation.

  • @fortzafit-train207
    @fortzafit-train207 Год назад

    Quick question, what do you use as that magic whiteboard? It’s an incredible teaching tool!

  • @4Q-2Q
    @4Q-2Q 2 года назад +2

    IBM: We have zero trust policy.
    Me: Why?
    IBM: why do you ask?

  • @Ahmed-gm8li
    @Ahmed-gm8li 2 года назад

    Thank you so much sir ^_^ I have learned a lot from you 🙂

  • @nicp2327
    @nicp2327 2 года назад +1

    Thank you! :)

  • @Mike-kq5yc
    @Mike-kq5yc 9 месяцев назад

    What about Data Integrity in Data?

  • @prione4023
    @prione4023 2 года назад +2

    Richard Gere explaing about Cyber security.....wow.

    • @kalkabob
      @kalkabob 2 года назад +1

      yikes...thanks? rofl.

  • @mehmoudmirza7057
    @mehmoudmirza7057 Год назад

    what kind of interactive screen does the presenter is using in this video ?

  • @brostagni
    @brostagni 2 года назад +1

    Nice and efficient

  • @LucasTreptow
    @LucasTreptow 9 месяцев назад

    is anyone gonna comment on the fact that this man is writing backwards with absolutely no issues

  • @jackieb6726
    @jackieb6726 4 месяца назад

    Did you have to practice writing backwards?? Also thank you!

  • @hazabaijan
    @hazabaijan Год назад

    Wait a second, is this guy writing backwards on the glass?!😮

  • @lakshmiprabhakarkoppolu9100
    @lakshmiprabhakarkoppolu9100 Год назад

    RUclips feed suggested me to watch this video. I am not sure why this topic is suggested by AI. #SIEM

  • @karashevf
    @karashevf 5 месяцев назад

    22K

  • @MrEmityushkin
    @MrEmityushkin 2 года назад

    +Plus

  • @Tooi-1grote-rotzooi
    @Tooi-1grote-rotzooi Год назад

    They are stealing my data right now

  • @karashevf
    @karashevf 5 месяцев назад

    758

  • @a4ldev933
    @a4ldev933 Год назад

    well... too much rambling... and no clear definition of what ZT is all about.

  • @karashevf
    @karashevf 5 месяцев назад

    758