The CISO Perspective
33.2K subscribers
12:20
Deepfakes Using Stable Diffusion: Creating and Identifying
The CISO Perspective
4.8K views • 7 months ago
11:25
Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security
The CISO Perspective
55K views • 1 year ago
6:36
What is Security Service Edge (SSE)? SASE vs SSE vs VPN
The CISO Perspective
58K views • 2 years ago
7:44
What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained
The CISO Perspective
118K views • 2 years ago
9:08
Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work
The CISO Perspective
15K views • 2 years ago
10:16
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
The CISO Perspective
67K views • 2 years ago
8:50
What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained
The CISO Perspective
17K views • 3 years ago
6:57
T-Mobile Data Breach: Timeline, Analysis and Lessons Learned
The CISO Perspective
7.7K views • 3 years ago
8:54
What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response
The CISO Perspective
197K views • 3 years ago
10:39
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
The CISO Perspective
23K views • 3 years ago
7:43
Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
The CISO Perspective
8.3K views • 3 years ago
8:07
What is Open Source Intelligence (OSINT)? The OSINT Tools, Techniques and Framework Explained
The CISO Perspective
30K views • 3 years ago
7:50
What is Secure Access Service Edge (SASE) ?
The CISO Perspective
125K views • 4 years ago
7:23
How to Use Canary Tokens for Threat Hunting
The CISO Perspective
23K views • 4 years ago
11:38
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
The CISO Perspective
6.8K views • 4 years ago
7:02
Securing Your VPN: Six Considerations
The CISO Perspective
8K views • 4 years ago
6:42
The Iran Cyber Threat: What You Need To Know
The CISO Perspective
3.7K views • 4 years ago
6:39
VNF: Five Considerations in Virtualizing Your Perimeter
The CISO Perspective
2.4K views • 4 years ago
11:53
Securing SD-WAN: 5 Considerations
The CISO Perspective
12K views • 4 years ago
14:04
ATT&CK Matrix: The Enemies Playbook
The CISO Perspective
50K views • 5 years ago
7:48
Securing Your AWS Virtual Private Cloud
The CISO Perspective
9.9K views • 5 years ago
6:25
Accomplishing Zero Trust Security Using SDP
The CISO Perspective
36K views • 5 years ago
13:18
Breaking The Kill Chain: A Defensive Approach
The CISO Perspective
162K views • 5 years ago
7:08
5 Terrifying Cyber-Security Trends for 2019
The CISO Perspective
26K views • 5 years ago
7:17
5 Considerations: Sizing Your Next-Gen Firewall (NGFW)
The CISO Perspective
52K views • 5 years ago
End of Videos