Cyber Threat Training
Cyber Threat Summit
Cyber Threat News
Cyber Video Feeds
Browse Video Feeds
Member Video Feeds
Autos & Vehicles
Film & Animation
Howto & Style
News & Politics
Nonprofits & Activism
People & Blogs
Pets & Animals
Science & Technology
Travel & Events
CYBERCRIME 2010 OPENER
The 9th annual DoD Cyber Crime Conference focuses on all aspects of computer crime: intrusion investigations, cyber crime law, digital forensics, information...
January 4, 2012
Information Assurance at Eastern Michigan University
Prepares individuals for careers in the exciting and challenging field of information assurance, which is in very high demand worldwide. Provides students wi...
August 2, 2013
Cybercrime and effects on economy
A Purdue University expert on computer security says that as cybercrime takes on a more global nature, it's more important than ever that governments around ...
IA Training - (888) 659-9597 - DoD Information Assurance
Learn the ins and outs of working in the Department of Defense Industry. We offer IA training for those looking to start a career in the DoD. Sign up for a f...
Lecture, Week 1, Intro to Information Assurance and Security
This is the first of five lectures I wrote and recorded for one of the classes I facilitate at the University of Phoenix. In this lecture, I discuss the basi...
Tue at 8:30 PM
GE Information Assurance
http://defense.ge-ip.com/mil-aero/advanced-tech/anti-tamper At GE Intelligent Platforms we understand that keeping advanced technology safe and secure in the...
Cybersecurity & Information Assurance with Barbara Endicott-Popovsky
The Pacific Rim Regional Collegiate Cyber Defense Competition provides real world cybersecurity and information assurance experience that can't be replicated...
Cyber security threats against the United States are growing, President Barack Obama said before a meeting on Wednesday with corporate leaders about the issu...
Information Assurance for Defense Security
Information Assurance (IA) are the methods for managing the risks to information assets. IA practitioners seek to protect the confidentiality, integrity, and...
November 25, 2013
Francis Maude's Information Assurance (IA12) Conference Speech
Minister for the Cabinet Office Francis Maude's speech to the Information Assurance (IA12) Conference.
June 23, 2013
Designing an Information Architecture to Support Cyber Security and Information Assurance
In the ever-growing virtual environment known as cyberspace, cyber-attacks can result in great damage to individuals, companies, or governments. These attack...
201305-02 12.00 CyberSecurity and Information Assurance
This webinar introduces the "Cyber Security and Information Assurance" course (June 11-12) that states these two terms are related practices that share objec...
May 3, 2013
Lecture, Week 2, Intro to Information Assurance and Security
This is lecture 2 of a five part series I wrote and deliver to my students during the class I facilitate online for the University of Phoenix. In this lectur...
Lecture, Week 4, Intro to Information Assurance and Security
This is lecture 4 of a five part series I wrote and deliver to my students during the class I facilitate online for the University of Phoenix. In this lectur...
Digital Forensics and Information Assurance
Digital Forensics program at Richland College, Dallas, TX.
DEF CON 15 - Tony Sager - Vulns and the Information Assurance Directorate
Vulnerabilities and The Information Assurance Directorate Tony Sager Chief, Vulnerability Analysis and Operations Group, Information Assurance Directorate, N...
Cyber Crime Analysis
This video is committed to improving the quality and increasing the awareness of information security/assurance in the education and business communities. Yo...
Security Governance - Information Assurance Overview
Paul C Dwyer CEO of TeamInfoSec presents an overview of Security Governance / Information Assurance and a methodology for organisations.
Lecture, Week 3, Intro to Information Assurance and Security
This is lecture 3 of a five part series I wrote and deliver to my students during the class I facilitate online for the University of Phoenix. It begins with...
Mark Orndorff - Chief Information Assurance Executive and PEO for Mission Assurance & NetOps
Mark Orndorff, DISA's chief information assurance executive and the program executive for mission assurance and network operations, shares DISA's strategy fo...
Benjamin - Information Assurance Grad Student
November 9, 2012
ISACA CEO Ronald Hale: Free-for-All in Cyber Crime Not Just for the Banks
Cyber crime costs banks and businesses billions of pounds each year and, according to the British Government's National Security Strategy, it is now one of t...
The Evolution of Information Assurance
From USENIX Security '12 Speaker: Dickie George, Johns Hopkins Applied Physics Laboratory This talk will discuss the change in assurance from the cold war of...
Lecture, Week 5, Intro to Information Assurance and Security
This is lecture 5 of a five part series I wrote and deliver to my students during the class I facilitate online for the University of Phoenix. In this lectur...
Information Assurance Training and compliance. Please visit http://www.informationassurancefacts.com/ for more information.
January 5, 2012
Vigilance: Information Assurance
http://www.hqusareur.army.mil HEIDELBERG, Germany "Think about it. Vigilance begins with you." Thats the catchphrase of a new U.S. Army Europe online informa...
DEFCON 15: Vulnerabilities and The Information Assurance Directorate
Speaker: Tony Sager Chief, Vulnerability Analysis and Operations Group, Information Assurance Directorate, National Security Agency The Information Assurance...
April 18, 2013
April 2014 NY Information Security Meetup - Lastline Inc Engin Kirda
"Evasive Malware Attacks" Engin Kirda, bio: In addition to his role at Lastline Inc., Engin Kirda holds the posts of Sy and Laurie Sternberg Associate Profes...
Center for Information Assurance
The Center for IA is dedicated to providing world-class research, training, and career development for Information Assurance professionals and students alike...
Information Assurance Student Group Promo Part 1
Information Assurance Student Group Video developed by Doug Jacobson and his students at Iowa State University.
December 11, 2013
CERIAS Security: The merge of Anti-Tamper and Information Assurance 2/6
Clip 2/6 Speaker: Scott Orton · Ratheon Scott Orton is the Anti-Tamper (AT) subject matter expert at Raytheon and was previously responsible for establishing...
April 18, 2013
Information Systems Security & Assurance Series
A Complete Curriculum Solution for IT Security, Cybersecurity, Information Assurance and Information Systems Security Programs. Visit www.issaseries.com for ...
September 12, 2013
Cyber Forensic Analysis - Cyber Crime - Cyber Forensic Documentary
A vivid and no-holds-barred look at how Professionals deal with cyber crime Cyber forensics, also called computer forensics or digital forensics, is the proc...
Cybersecurity, cybercrime and cyberwarfare: how real is the threat? - Part 2
Dr Ian Brown, a senior research fellow at the Oxford Internet Institute, gave a lively presentation entitled 'Cybersecurity, cybercrime and cyberwarfare: how...
September 9, 2013
Global Cyber Threat- Grand Champion of DoD Digital Forensics Challange Cyber Crime Center
Documentary on digital forensics agents from the Department of Defense, using computer forensics and technology to solve crimes and provide cyber security. W...
Cybercrime in the World Today: 2014 | ACCA Official
ACCA USA and Pace University hosted a cybercrime symposium and panel discussion at New York's Pace University. The event, "Cybercrime in the World Today 2014...
Cybercrime in the World Today 2013 | ACCA Official
ACCA USA and Pace University hosted a cybercrime symposium and panel discussion at New York's Pace University. The event, "Cybercrime in the World Today 2013...
Surveillance, Cyber Crime & Cyber Espionage
Panel: Howard Schmidt, former Special Assistant to the President, Cyber Security Coordinator at Executive Office of the President, White House Norbert Pohlma...
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare I The Great Courses
http://www.thegreatcourses.com/cybersecurity Cyberspace is the 21st century's greatest engine of change. And it's everywhere. Telecommunications, commercial ...
2009-09-23 CERIAS - The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb...
Recorded: 09/23/2009 CERIAS Security Seminar at Purdue University The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb... Rick Aldri...
August 28, 2013
Software and Supply Chain Risk Management (SSCRM) Assurance Framework
Supply Chains in the wild are intrinsically risky, vulnerable to Cybercrime and Cloud Computing risks as well as organizational neglect and unmet needs. The ...
Army Batman talks about USB device safety. | AiirSource
Army Batman talks about Information Assurance Violations. === AiirSource === Give us your thumbs up for the Bagram Batman! AiirSource - A video and news hub...
ShmooCon 2014: Vehicle Forensics - The Data Beyond the Dashboard
With vehicle technologies constantly evolving, it is important to understand the threat to the consumer that leaves personal data behind, as well as the bene...
Information Assurance TV
May 22, 2010
Computer Forensics Interested in a career investigating cybercrime? MCTC's unique Computer Forensics program provides an integrated background in information...
DEF CON 15 - Panel - Meet the Feds
Panel: Meet the Fed This year we will have so many feds representing their federal agencies that we will have to break it up into two separate panels: IA Pan...
William Heath talks about identity assurance and Mydex CIC
To find out more, visit http://mydex.org/identity/ For more information about Mydex, kindly visit http://mydex.org/about/ Or visit the developers site at htt...
July 14, 2013
How to Write an Information Security Policy in 5 Minutes
Create a draft information security policy in less than five minutes using policy templates. Take the work out of writing security polciies. The templates ca...
Cybercrime Law Bea Cayetano
Tue at 2:01 AM
2013 ISSA Intl Conference Keynote Eugene Spafford (Spaf) Exec Dir, CERIAS & Prof - Purdue University
Eugene H. Spafford is one of the senior, most recognized leaders in the field of computing. He has an ongoing record of accomplishment as a senior advisor an...
ICTTF International Cyber Threat Task Force - Email: firstname.lastname@example.org - Phone: +44 (0)20 8144 2701
Copyright ©2014 -
Terms of Service