- 173
- 180 446
CYBERUK ONLINE
United Kingdom
เข้าร่วมเมื่อ 15 เม.ย. 2021
Welcome to the CYBERUK TH-cam Channel! CYBERUK is the UK government’s annual flagship cyber security event hosted by the National Cyber Security Centre (NCSC). Bringing together government, national security, industry and academia to deliver world class content, cementing the UK’s position as a responsible and democratic cyber power, able to protect and promote our interests in and through cyberspace.
On the channel you will find a range of content from previous events, conversations, topic reviews and insights into the forthcoming event. Check back regularly for new content in the lead up to CYBERUK 2025!
On the channel you will find a range of content from previous events, conversations, topic reviews and insights into the forthcoming event. Check back regularly for new content in the lead up to CYBERUK 2025!
Protective DNS and Quantum AI for data security
Freha Arshad, Managing Director Health & Public Services Security Practice for Accenture and Daniel Alexander, Head of Public Sector UK for Cloudflare, the connectivity cloud company, in conversation with NCSC’s Director for Resilience Jon Ellison on Protective DNS and Quantum AI for data security.
มุมมอง: 144
วีดีโอ
Reflections of a former National Cyber Director
มุมมอง 1144 หลายเดือนก่อน
Jonathon Ellison (Director for National Resilience and Future Technology, NCSC) sits down with Kemba Walden (President, Paladin Global Institute).
Securing the future
มุมมอง 584 หลายเดือนก่อน
James Stewart (Director for Communications, NCSC) talks to Clint Watts (General Manager, Microsoft's Threat Analysis Center) about securing the future.
The biggest hack ever?
มุมมอง 1184 หลายเดือนก่อน
Eleanor Fairford (Deputy Director Incident Management, NCSC) and Geoff White (Author and Investigative Journalist).
Hear from the winner of Cyber Den 2024
มุมมอง 514 หลายเดือนก่อน
Hear from Joseph Wilson, Head of Strategic Innovation at Optalysys
The challenge of net zero
มุมมอง 554 หลายเดือนก่อน
Dr. Marsha Quallo-Wright (Deputy Director for Critical National Infrastructure, NCSC) and Ann Dunkin (Cheif Information Officer, U.S Department of Energy) discuss the challenge of net zero.
Supply Chain Risk Management
มุมมอง 1584 หลายเดือนก่อน
Ed Parsons, Vice President Global Markets for ISC2, in conversation with NCSC Director of Communications James Stewart on Supply Chain Risk Management.
CYBERUK 2024 Highlights Day 2
มุมมอง 1.7K7 หลายเดือนก่อน
A review of the second day of CYBERUK 2024 in Birmingham
Future Tech and AI
มุมมอง 3317 หลายเดือนก่อน
NCSC Chief Technology Officer Ollie Whitehouse in conversation with Heather Adkins, Vice President Security Engineering and Head of Google’s Office of Cybersecurity Resilience, about future tech and AI.
Defend as One
มุมมอง 2677 หลายเดือนก่อน
NCSC Deputy Director for Government Cyber Resilience Ian McCormack and Bella Powell, The Cyber Director for the Government Security Group in the Cabinet Office, discuss how the UK can Defend As One.
Global Harmonization of Standards Management
มุมมอง 1347 หลายเดือนก่อน
NCSC Director for Communications James Stewart talks to Tara Wisniewski, Executive Vice President of Advocacy, Global Markets and Member Engagement for ISC2 on Day 1 of CYBERUK 2024 on the subject of global harmonization of standards management.
Responding to an Evolving Threat Picture
มุมมอง 2447 หลายเดือนก่อน
Responding to an Evolving Threat Picture
James Stewart, NCSC in conversation with Stephen McPartland MP
มุมมอง 1967 หลายเดือนก่อน
James Stewart, NCSC in conversation with Stephen McPartland MP
Akamai: Unpack the evolving threat landscape confronting the public sector in the digital age.
มุมมอง 1457 หลายเดือนก่อน
Akamai: Unpack the evolving threat landscape confronting the public sector in the digital age.
Hear from CYBERUK 2024 lead sponsors Akamai and Google Cloud.
มุมมอง 2757 หลายเดือนก่อน
Hear from CYBERUK 2024 lead sponsors Akamai and Google Cloud.
Ultra: Cyber Imperatives from the Frontlines - Insights from Ultra I&C
มุมมอง 2637 หลายเดือนก่อน
Ultra: Cyber Imperatives from the Frontlines - Insights from Ultra I&C
Immersive Labs: Key Cyber Workforce Benchmark Findings
มุมมอง 937 หลายเดือนก่อน
Immersive Labs: Key Cyber Workforce Benchmark Findings
KnowBe4: Enabling Security Culture to Reduce Human Risk
มุมมอง 1907 หลายเดือนก่อน
KnowBe4: Enabling Security Culture to Reduce Human Risk
BeyondTrust: Understanding Deepfake Threats: Zero Trust Lessons Learned from the Hong Kong Deepfake
มุมมอง 1157 หลายเดือนก่อน
BeyondTrust: Understanding Deepfake Threats: Zero Trust Lessons Learned from the Hong Kong Deepfake
ESET: Navigating future threats in an Era of global connectivity
มุมมอง 547 หลายเดือนก่อน
ESET: Navigating future threats in an Era of global connectivity
BlueVoyant: NIS2 Directive - Roadmap to ReadinessGuidance for UK organisations operating in the EU
มุมมอง 857 หลายเดือนก่อน
BlueVoyant: NIS2 Directive - Roadmap to ReadinessGuidance for UK organisations operating in the EU
Sophos: The Seven Sins of Ransomware Preparedness
มุมมอง 1127 หลายเดือนก่อน
Sophos: The Seven Sins of Ransomware Preparedness
Egress: AI in security, the security of AI, and the evolution of AI-powered cyberattacks
มุมมอง 1157 หลายเดือนก่อน
Egress: AI in security, the security of AI, and the evolution of AI-powered cyberattacks
ISC2: What is the real-world impact of AI on the cybersecurity profession?
มุมมอง 1017 หลายเดือนก่อน
ISC2: What is the real-world impact of AI on the cybersecurity profession?
Crowdstrike: Identity & Social Engineering, Adversaries Leveraging the Cloud, 3rd Party Supplier
มุมมอง 1157 หลายเดือนก่อน
Crowdstrike: Identity & Social Engineering, Adversaries Leveraging the Cloud, 3rd Party Supplier
Microsoft: Innovating & Defending in the Era of AI
มุมมอง 1377 หลายเดือนก่อน
Microsoft: Innovating & Defending in the Era of AI
NCC Group: Together, at CYBERUK 2024, let’s create a more secure digital future
มุมมอง 1337 หลายเดือนก่อน
NCC Group: Together, at CYBERUK 2024, let’s create a more secure digital future
Do you need to have a domain to implement PAM for remote machines?
Deep state, unelected operator
😊😊😊😊😊😊
Great discussion on the importance of supply chain risk management. Loved the insights on leveraging technology and the emphasis on building positive relationships with suppliers.
🚥🚦🚥🚦🚥🚦🚥
Nut-zero!
Thanks a lot.
Can you explain how the human biofield is connected to the cloud? IEEE. Cybersecurity. Writing data to my blood and tissue?
Danke euch... Schon mal 😉🙏
Lets note the AI generated summary :) The panel discussed future technology’s impact on cyber security, focusing on AI, quantum computing, and secure design. They emphasized the potential benefits and challenges of AI, the importance of integrating security into technology design, and the need for collaboration. Other topics discussed included diversity in cyber security systems, innovations in quantum computing, and talent development in India. Highlights 🤖 AI can improve efficiency for attackers and defenders in cyber security. 🚀 Security must be integrated into technology design from the beginning. 💪 Collaboration and partnership between security and technology teams are crucial. 🌍 Cyber security systems should be diverse and patchy. 🔐 Quantum computing requires error correction and data protection. 🇮🇳 India emphasizes talent development for diverse technology needs. 📈 Futurist identifies emerging technologies with cyber security implications. Key Insights 🤖 AI’s potential for both attackers and defenders: AI can enhance the efficiency of cyber attackers, but it also offers defenders the opportunity to improve their ability to combat threats. This highlights the importance of secure use of AI and the need for organizations to adopt secure AI frameworks. 🚀 Secure design as a foundation: Integrating security into technology design from the beginning is crucial for creating robust and resilient systems. User-centric design, improving the developer experience, and establishing security invariants are key considerations in achieving secure design. 💪 Collaboration for effective cyber security: Collaboration and partnership between security and technology teams are essential for addressing emerging challenges in cyber security. Long-term partnerships can foster synergy and enable effective responses to evolving threats. 🌍 Diversity in cyber security systems: Just as diversity in immune responses is important for combating diseases, diverse and patchy cyber security systems can enhance resilience against cyber threats. This approach ensures that a single vulnerability does not compromise the entire system. 🔐 Quantum computing’s unique challenges: Quantum computing brings unprecedented computational power, but it also introduces new challenges. Quantum error correction and data protection mechanisms are essential to harness its potential while maintaining security. 🇮🇳 Talent development for diverse technology needs: India’s diverse technology landscape requires a focus on talent development to effectively address cyber security challenges. Building a skilled workforce capable of handling the scale and diversity of technology is crucial. 📈 Identifying emerging technologies for cyber security: Futurists can play a vital role in identifying emerging technologies with cyber security implications. Their insights can help organizations stay ahead of the curve and proactively prepare for future challenges.
Summary generated by AI Summary The panel discussion focuses on future technology and its impact on power efficiency, security, and software development. It highlights the need for secure by design practices and the integration of hardware and software in future technology. Highlights 💡 The sponsors emphasize the importance of microelectronics and reliable power. 💡 Panelists discuss the economic aspects of software vulnerabilities and challenges faced by smaller companies in implementing secure design practices. 💡 The demand signals for secure products and services are discussed. 💡 A shift towards secure by design practices is emphasized. 💡 Power efficiency, security, and hardware-software integration are highlighted. 💡 Flaws in the current cybersecurity model are discussed. 💡 The importance of user experience and developer engagement in achieving secure by design is emphasized. Key Insights 🔍 The current cybersecurity model has flaws that need to be addressed to ensure stronger security measures. 🔍 Small companies face challenges in implementing secure design practices, which need to be overcome for better cybersecurity. 🔍 Demand signals for secure products and services indicate a growing need for enhanced security measures. 🔍 The shift towards secure by design practices is crucial to improve overall cybersecurity. 🔍 Power efficiency, security, and hardware-software integration are key aspects of future technology that need to be prioritized. 🔍 User experience and developer engagement play pivotal roles in achieving secure by design. 🔍 Communicating the cost-effectiveness and potential advantages of secure by design is important, especially for startups.
Love the “sharing toys, playing nicely and working as a team” may steal that one. Defend as One has been a passion of mine, sharing our knowledge and skills with in our public sector departments and agencies as we usual operate with tight budgets, have issues attracting and retaining talent, historically NDPBs in particular tend to undervalue the talent they have who are in public sector not because they can’t get better remuneration elsewhere but because they want to make a difference and see value in tech/digital innovation and cyberdefence for the betterment of the nation.
😊😊😊😊😊😊😊😊😊😊
Oh that was clever .. looking forward to meet many of industry peers
😊😊😊😊😊
Interesting comments ref post quantum crypt
Cyber always sounds sexy but the simplicity of a white van, a handful of individuals in hard hats and Hi-Viz jackets, some safety fencing and a moderately convincing story-line can deliver devastating consequences to an infrastructure. The corresponding cost of perpetration of such an “intrusion” is way below that of a cyber-attack but could have equally disastrous results.
Un saludo para la presentadora y para la invitada son muy hermozas e inteligentes esa esa es mi apreciasion gracias
Cyber is importan for my work and job ok
Im agent Mi5 ugo martin leonardo oviedo ospino
What licence do you need in order to use this feature?
I worked with Brian Webb, he was a horrible man
Can confirm, it was a very unpleasant experience for me too.
Helpful video in understanding the challenges with face trusting the sources of information. Some feedback on the video is the main speakers audio is hard to listen too with the EQ applied.
Is it time to turn off all big tech or just take all their wealth for their crimes of theft and harm of humanity? I say take them all off earth and this one can go first.
Good morning, Please I have no pure or deep IT knowledge. But I have a deep desire and intentions to switch career into Cyber Security. Please I need a guideline on how or where I can get an online training. Thanks
The IRA is no longer in existence. Update your 'intelligence'. Bigotry is a curse.
Great to see two female leaders in the cyber world. Also appreciate Jen's cool nailart. I know it's superficial to point something like this out but optics is important in cyber which can seem quite dry and technical and this kind of representation makes cyber more accessible to a diverse audience
Thank you NCC. The Threat is VERY much here. It is extending, expanding and harmful. It will continue to test the limits of our Protection.
Great to hear the views of the legendary Hermann Hauser on startups, venture capital, technology and cybersecurity. We're delighted to have him on the TechWorks board.
Great video. This is a wealth of information! Will you be doing more in depth videos on this?
yo!you ddi top - talk you later. ))
how to join
I'll do inform at any emergency I inspected in cyber, bio, drug and environment allerts. at twitter, youtube, facebook and any other method when which one or more hacked. I'll do my best to inform and let us to do efforts to fix it. s
I remember a few years ago doing a case study presentation to some undergraduates, and one of the students asked for a copy of my slides. So I plugged his USB stick into my laptop and bingo, my AV scanner found that it was infected. The student seemed not concerned about this at all. As I says, that was a few years ago pre-pandemic, but we need to get cyber hygiene so that things like that are considered not acceptable.
Whole of Society approach is important, and making it easier. So that everyone can practice good cyber hygiene easily, with a simple message almost like 'hands, face, space' has been during the Covid-19 pandemic. We all got the message of hand washing for 20 seconds and the 2 metre distance rule, because it was simple, clear, and easy + there was also victim support.
Think I'd go to the gym straight after a conference rather than booze.
No, thank you.
Lisa is a great speaker, always comes across as honest, she's a great representative for NZ.
Some very good points. It was unclear though about how the benefits of the tech been developed today is often always about making a persons data the commodity. Data brokers have already broken digital identity which is near impossible to recover.
Some great presentations. The audio on the discussions was not that good, mics need sorting for the next sessions.
Excellent.
Canlarısıkılıyormuş🤨
When will tickets be available to book?.
Cyber Security education (in fact IT education in general) is prohibitively expensive unless you are sponsored by a company to do it i.e. you need to already be employed in an IT role e.g. BCS Certificate in Information Security Management Principles starting at £2,285+VAT !
Is there a list of the approved courses?
Superb deep talk on wide ranging topics, tools and techniques of Cybersecurity Story about Narratives Nudged Notional Future-Shelves Silently Hacking Technology Controlled Human Animal Thinking Senses.
Hello everyone fexty hackers on TH-cam got me five hundred thousasnd dollar from their software they really helped me financially guys.
One of the best deep dense dynamics developed original condensed research work presentation on internet with crystal clear cross cutting conceptual analytics insight over highly complex subject matters expertise at Cybersecurity Crisis Management Technologies.