The CISO Perspective
30.2K subscribers
12:20
Deepfakes Using Stable Diffusion: Creating and Identifying
The CISO Perspective
3.1K views • 2 months ago
11:25
Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security
The CISO Perspective
51K views • 1 year ago
6:36
What is Security Service Edge (SSE)? SASE vs SSE vs VPN
The CISO Perspective
44K views • 1 year ago
7:44
What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained
The CISO Perspective
96K views • 1 year ago
9:08
Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work
The CISO Perspective
12K views • 2 years ago
10:16
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
The CISO Perspective
61K views • 2 years ago
8:50
What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained
The CISO Perspective
15K views • 2 years ago
6:57
T-Mobile Data Breach: Timeline, Analysis and Lessons Learned
The CISO Perspective
7.4K views • 2 years ago
8:54
What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response
The CISO Perspective
174K views • 2 years ago
10:39
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
The CISO Perspective
21K views • 3 years ago
7:43
Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
The CISO Perspective
7.8K views • 3 years ago
8:07
What is Open Source Intelligence (OSINT)? The OSINT Tools, Techniques and Framework Explained
The CISO Perspective
29K views • 3 years ago
7:50
What is Secure Access Service Edge (SASE) ?
The CISO Perspective
111K views • 3 years ago
7:23
How to Use Canary Tokens for Threat Hunting
The CISO Perspective
21K views • 3 years ago
11:38
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
The CISO Perspective
6.5K views • 3 years ago
7:02
Securing Your VPN: Six Considerations
The CISO Perspective
7.5K views • 4 years ago
6:42
The Iran Cyber Threat: What You Need To Know
The CISO Perspective
3.5K views • 4 years ago
6:39
VNF: Five Considerations in Virtualizing Your Perimeter
The CISO Perspective
2.3K views • 4 years ago
11:53
Securing SD-WAN: 5 Considerations
The CISO Perspective
11K views • 4 years ago
14:04
ATT&CK Matrix: The Enemies Playbook
The CISO Perspective
48K views • 4 years ago
7:48
Securing Your AWS Virtual Private Cloud
The CISO Perspective
9.1K views • 4 years ago
6:24
Accomplishing Zero Trust Security Using SDP
The CISO Perspective
33K views • 5 years ago
13:18
Breaking The Kill Chain: A Defensive Approach
The CISO Perspective
150K views • 5 years ago
7:07
5 Terrifying Cyber-Security Trends for 2019
The CISO Perspective
26K views • 5 years ago
7:16
5 Considerations: Sizing Your Next-Gen Firewall (NGFW)
The CISO Perspective
50K views • 5 years ago
End of Videos