Curated Video
SkillSprints: Identity Theft
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Curated Video
High Five Facts - Online Safety
This video explores five fun facts about Online Safety.
Curated Video
Digital Citizenship
The video “Digital Citizenship” discusses how to be safe, responsible, and respectful when using technology.
Curated Video
Social Media Security
Social media security is the practice of analyzing data from active social media sites to protect against threats and security breaches.
Curated Video
Types of Data
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Curated Video
I WONDER - How Can You Stay Safe Online?
This video is answering the question of how can you stay safe online.
Curated Video
iPhone Security Model
In this video, we will be discussing the iPhone Security Model. We will explore the various layers of security that Apple has implemented to protect your personal data and information. From the hardware level to the software level, we...
Healthcare Triage
Suicide Rates and Insights from Medical Sociology - Healthcare Triage
Aaron's guest this month is Dr. Bernice Pescosolido, who is a medical sociologist at Indiana University. Dr. Pescosolido studies the environments, neighborhoods, and connections that contribute to patients' identities, and looks how this...
The Wall Street Journal
"Reasonable Security" Under the California Consumer Privacy Act
The California Consumer Privacy Act is the first to provide consumers with statutory damages and a private right of action if data is breached. How do you implement a program that aligns to the expectations of the CCPA and other...
The Wall Street Journal
Which Regulations to Worry About
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
The Wall Street Journal
Future Of: Data
How should brands, networks and publishers adapt in the age of "always-on" connectivity? As privacy issues, and trust surrounding the platforms, dominate the news cycle, has the way brands develop and disseminate campaigns changed?
National Institute of Standards and Technology
Forum on National Strategy for Trusted Identities in Cyberspace
This forum on the National Strategy for Trusted Identities in Cyberspace (NSTIC) was held at Stanford University on January 7, 2011. It featured presentations by Commerce Secretary Gary Locke and White House Cybersecurity Coordinator...
National Institute of Standards and Technology
National Strategy for Trusted Identities in Cyberspace (NSTIC)
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...
Seven Dimensions
Addressing Privacy Breaches in the Workplace
In this video, a group of employees discuss the importance of privacy and security in the workplace. They address issues such as breaching privacy, collecting personal information, and inappropriate behavior towards clients. The...
The Wall Street Journal
The Future of Data Privacy
We take a look at the state of consumer privacy laws around the world and discuss what the death of third party cookies, and the expansion of privacy laws, means for the future of digital advertising.
Curated Video
Apache Kafka - Real-time Stream Processing (Master Class) - Creating Streams Topology
In this lecture, you will learn the notion of the Topology in more detail. We will also explore some available transformation methods that we can use to create a processor topology. Further, we will take a fairly complex business...
Learning Mole
Secure Online Banking
Jamal wonders how to keep your money safe online after someone attempts to hack into his bank. How do you keep your money safe? What steps can you take to be careful? How safe is online banking?
The Wall Street Journal
The Changing Face of Hospitals
Leslie Davis of UPMC and Gianrico Farrugia of Mayo Clinic, the chief executives of two of the country’s leading health systems, talk about how the pandemic has permanently changed their business.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Protection
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Next Animation Studio
U.S. charges four Chinese military operatives in Equifax 2017 hack
A federal grand jury charged four Chinese military officers on Tuesday for the massive hack of the credit rating giant Equifax that occurred in 2017.
The Wall Street Journal
What To Report
What should a CISO report to the executive team and board, and what do board members want to know? We'll look at what corporate stakeholders regard as the principles of reporting and the most useful information.
IDG TECHtalk
Complying with CCPA: Answers to common questions
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss...
IDG TECHtalk
How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)
The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to sell...