Скачать
Demystifying Operational Resilience
Автор: Software Engineering Institute | Carnegie Mellon University
Загружено: 2025-06-04
Просмотров: 213
Описание:
Explore the SEI's Enterprise Risk and Resilience Management work:
https://insights.sei.cmu.edu/enterpri...
As they face ever-mounting threats and risks due to their cyber presence, it is easy for organizations to feel uncertain in how they should approach such a task. A cyber presence is essential to a business’s success today, but threats leave companies very much unsure of what they should or can do to protect themselves. The proliferation of “solutions” today complicates their determination of what is a wise investment versus a waste of money. Fortunately, there are some concrete steps an organization can take to be confident that they are wisely investing in organizational resilience.
What Attendees Will Learn:
• How to define risk and resilience
• A “fit for your organization” approach to resilience
• Steps in a plan for achieving resilience
Speaker: Alexander Petrilli and Matthew Butkovic
@TheSEICMU
#operationalresilience #cyberresilience #cybersecurity
Развернуть
Доступные форматы для скачивания:
Похожие видео
array(10) {
[0]=>
object(stdClass)#4838 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "i4WDeWhctK8"
["related_video_title"]=>
string(70) "The State of DevSecOps in the DoD: Where We Are, and What’s Next"
["posted_time"]=>
string(67) "Трансляция закончилась 1 месяц назад"
["channelName"]=>
string(59) "Software Engineering Institute | Carnegie Mellon University"
}
[1]=>
object(stdClass)#4811 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ncYg5sPyw5U"
["related_video_title"]=>
string(54) "Threat Hunting: What Should Keep All of Us Up at Night"
["posted_time"]=>
string(69) "Трансляция закончилась 2 месяца назад"
["channelName"]=>
string(59) "Software Engineering Institute | Carnegie Mellon University"
}
[2]=>
object(stdClass)#4836 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Eo17hsEqQMM"
["related_video_title"]=>
string(66) "AI Systems Engineering: From Architecture Principles to Deployment"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
string(59) "Software Engineering Institute | Carnegie Mellon University"
}
[3]=>
object(stdClass)#4843 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5e-8TK7835k"
["related_video_title"]=>
string(37) "Identifying and Mitigating Cyber Risk"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
string(59) "Software Engineering Institute | Carnegie Mellon University"
}
[4]=>
object(stdClass)#4822 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "EiEgzuTB_Ok"
["related_video_title"]=>
string(77) "New Data Exchange Standard Eases Insider Incident Data Collection and Sharing"
["posted_time"]=>
string(69) "Трансляция закончилась 2 месяца назад"
["channelName"]=>
string(59) "Software Engineering Institute | Carnegie Mellon University"
}
[5]=>
object(stdClass)#4840 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "x6TsR3y5Qfg"
["related_video_title"]=>
string(45) "Think Faster, Talk Smarter with Matt Abrahams"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(15) "Stanford Alumni"
}
[6]=>
object(stdClass)#4835 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[7]=>
object(stdClass)#4845 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "o8NPllzkFhE"
["related_video_title"]=>
string(44) "The mind behind Linux | Linus Torvalds | TED"
["posted_time"]=>
string(19) "9 лет назад"
["channelName"]=>
string(3) "TED"
}
[8]=>
object(stdClass)#4821 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "NExbobK7XlY"
["related_video_title"]=>
string(74) "The Wolf-Krugman Exchange: The economy in an uncertain world | FT Podcasts"
["posted_time"]=>
string(21) "1 день назад"
["channelName"]=>
string(15) "Financial Times"
}
[9]=>
object(stdClass)#4839 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-Vd1aesu1lY"
["related_video_title"]=>
string(102) "Арестович: Украина и Россия перепутали врагов. @yulialatynina71"
["posted_time"]=>
string(23) "9 часов назад"
["channelName"]=>
string(17) "Alexey Arestovych"
}
}
The State of DevSecOps in the DoD: Where We Are, and What’s Next
Threat Hunting: What Should Keep All of Us Up at Night
AI Systems Engineering: From Architecture Principles to Deployment
Identifying and Mitigating Cyber Risk
New Data Exchange Standard Eases Insider Incident Data Collection and Sharing
Think Faster, Talk Smarter with Matt Abrahams
Разведчик о том, как использовать людей
The mind behind Linux | Linus Torvalds | TED
The Wolf-Krugman Exchange: The economy in an uncertain world | FT Podcasts
Арестович: Украина и Россия перепутали врагов. @yulialatynina71