Cybersecurity Architecture: Data Security

Поделиться
HTML-код
  • Опубликовано: 22 май 2024
  • IBM Security QRadar EDR : ibm.biz/BdyJLn
    IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyJLp
    Many companies refer to their data as the "crown jewels" for a reason - it represents one of a company's most valuable assets. That's also why preventing a data breach should be at the top of your security priorities. In this video, IBM Distinguished Engineer and Adjunct Professor lays out the concerns of data security and explains the processes you should have in place to discover, secure, and govern your data across your enterprise.
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #datasecurity

Комментарии • 23

  • @kemsthegreat
    @kemsthegreat 5 месяцев назад +9

    Jeff proves his Ph.D. well. He explained these topics in a way everyone can understand. Not dumbed down.

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Thank you for the kind words!

  • @hunter5701
    @hunter5701 Месяц назад +1

    Love this whole series. I'm a senior consultant at a major cybersecurity company and this has given me a knowledge roadmap. Thank you so much.

    • @jeffcrume
      @jeffcrume 24 дня назад

      You’re very welcome!

  • @billyfoster3223
    @billyfoster3223 5 месяцев назад +3

    Great video series! This is helping me with my cybersecurity studies! Thanks!😁👍

    • @jeffcrume
      @jeffcrume 4 месяца назад

      As a teacher, I love hearing this!

  • @materubass
    @materubass 10 месяцев назад +3

    Awesome video. When it comes to data protection one topic that is sometimes overlooked is encryption for data-in-use. There are technologies such as Redis that tend to put data in-memory (a place that is not always encrypted by default) which could be subject to memory dumps where sensitive data as well as encryption keys could be extracted from. Thankfully Intel and AMD have improved memory protection (TME and SME) in their latest processors families enabling encryption for data-in-use.

  • @atocampoari8575
    @atocampoari8575 10 месяцев назад +6

    Ever since i took a course on cybersecurity by IBM...your ability to simplify complex and lengthy content is so smooth and easy to grasp....you are now my favourite teacher😎🔥

    • @jeffcrume
      @jeffcrume 10 месяцев назад +1

      Very nice of you to say so! I’m really glad you are enjoying the videos!

  • @gavbam
    @gavbam 5 месяцев назад +1

    Kudos to the instructor, now only was the content engaging but kept to the content without going down the path of blowing his own trumpet on every topic. Thank you for the clear and concise information.

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Thank you for the kind complements!

  • @kent_calvin
    @kent_calvin 10 месяцев назад +6

    My favourite teacher is back 🎉

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      Thanks so much for the kind words! 😊

  • @LutherDrucker
    @LutherDrucker 6 дней назад

    Love to learn these kind of architecture!!
    Also just got to know about a Irys which is world only provenance layer that is making buzz all around do you know about it !!

  • @rafaelkss2009
    @rafaelkss2009 10 месяцев назад +1

    great series

  • @pankaj16octdogra
    @pankaj16octdogra 10 месяцев назад +1

    Nice presentation

  • @tomahs9823
    @tomahs9823 10 месяцев назад +1

    Great Video!

  • @srivasala4080
    @srivasala4080 10 месяцев назад +1

    Super👌

  • @WilhelmPendragon
    @WilhelmPendragon 2 месяца назад +1

    So if your company’s total value is below 4.35M, a data breach has already eliminated your company?

    • @jeffcrume
      @jeffcrume 2 месяца назад

      Not likely. That’s the AVERAGE cost for ALL companies. Your situation can always vary

  • @user-tk7xt3wq8r
    @user-tk7xt3wq8r 6 месяцев назад

    10:00 🗃️📚📝

  • @RC19786
    @RC19786 3 месяца назад +1

    frankly speaking, coming from an expericne in cybersec and passion for it, Data Security has to b one of the most boring aspects of it! 🙂

    • @jeffcrume
      @jeffcrume 2 месяца назад +2

      … Yet one of the most critical 😊