The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 พ.ค. 2024
  • An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from small businesses up to the Fortune 100 level. Nick founded Windy City Networks, Inc in 1998 at age 19 and was acquired by BSSi2 LLC in 2013 where he is their CIO. In 2015 Security Fanatics, a Cybersecurity/Cyberwarfare outfit dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched. A nationally recognized speaker, member of the Forbes Technology Council, regular columnist for Forbes, on the Board of Advisors for both Roosevelt University’s Center for Cyber and Information Security and Bits N’ Bytes Cybersecurity Education, award winning co-author of a bestselling book “Easy Prey”, and host of “The Deep Dive” radio show on 101.3FM WHIW, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from small businesses up to the Fortune 100 level. Nick founded Windy City Networks, Inc in 1998 at age 19 and was acquired by BSSi2 LLC in 2013 where he is their CIO. In 2015 Security Fanatics, a Cybersecurity/Cyberwarfare outfit dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched. A nationally recognized speaker, member of the Forbes Technology Council, regular columnist for Forbes, on the Board of Advisors for both Roosevelt University’s Center for Cyber and Information Security and Bits N’ Bytes Cybersecurity Education, award winning co-author of a bestselling book “Easy Prey”, and host of “The Deep Dive” radio show on 101.3FM WHIW, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at www.ted.com/tedx

ความคิดเห็น • 136

  • @Sam-rp4hy
    @Sam-rp4hy 4 ปีที่แล้ว +460

    Law 1: if there is a vulnerability, it will be exploited.
    Law 2: Everything is vulnerable in some way
    Law 3 :Humans can trust when they shouldn't.
    Law 4 : with innovation comes opportunity for exploitation.
    Law 5: when in doubt, see law 1

  • @dinandjait
    @dinandjait 5 ปีที่แล้ว +235

    Penn? Is that you?

    • @NickEspinosa
      @NickEspinosa 5 ปีที่แล้ว +42

      That's my night job lol. Thanks!

    • @jacobl.743
      @jacobl.743 4 ปีที่แล้ว +2

      dude I was thinking the same, I was excited to watch Penn talk about cybersecurity

    • @dorjinphuntsok8271
      @dorjinphuntsok8271 3 ปีที่แล้ว

      Same question.. penn? Is that you.

    • @erdemsk3023
      @erdemsk3023 3 ปีที่แล้ว

      Who is Penn?

    • @erdemsk3023
      @erdemsk3023 3 ปีที่แล้ว

      @Student Tyler Pullum Thanks!

  • @sohatyi
    @sohatyi 5 ปีที่แล้ว +74

    I liked this, it's punchy and has an important message without descending into too much jargon.

    • @NickEspinosa
      @NickEspinosa 5 ปีที่แล้ว +9

      Thanks, Jeff! I appreciate the kind words!

  • @jackfitzpatrick6863
    @jackfitzpatrick6863 5 ปีที่แล้ว +37

    Excellent presentation. Recognizing that "everything is vulnerable" is especially important; to some, this may seem paranoid, but it's best to be proactive in this field. Acknowledge the limitations of existing protective measures, assess them, then present new solutions.

  • @ajbooysen4895
    @ajbooysen4895 ปีที่แล้ว +6

    This amazing to watch. Nick is a remarkable presenter. I was literally draw in from the first line to the last. Great presentation.

  • @rootabeta9015
    @rootabeta9015 4 ปีที่แล้ว +100

    Everyone is making fun of this guy for looking like a magician but in reality he's just an ordinary Penntester

    • @softaildiaries
      @softaildiaries 4 ปีที่แล้ว +2

      No he's probably just a ordinary millionaire!

    • @shadynumbers8561
      @shadynumbers8561 2 ปีที่แล้ว +3

      Pen and teller 😂😂😂

    • @zsauffi
      @zsauffi 2 ปีที่แล้ว

      penne tester ?
      🍝

    • @rootabeta9015
      @rootabeta9015 2 ปีที่แล้ว

      @@zsauffi Oh how I wish that were my job title

    • @VictoriaSobocki
      @VictoriaSobocki ปีที่แล้ว

      Hahaha

  • @jobhuntcoach
    @jobhuntcoach 5 ปีที่แล้ว +31

    Such a great presenter.. he makes everything clear and concise

    • @NickEspinosa
      @NickEspinosa 5 ปีที่แล้ว +5

      Thank you! I really appreciate the kind words!

    • @5710fpilot
      @5710fpilot 2 ปีที่แล้ว

      @@NickEspinosa I would love to see this updated for 2022.

  • @nathanb.forrest3406
    @nathanb.forrest3406 4 ปีที่แล้ว +36

    I thought that was the magician Penn

  • @alkatz8292
    @alkatz8292 3 ปีที่แล้ว

    Very Informative. Thanks Nick

  • @IanFaria-Blr-India
    @IanFaria-Blr-India 2 ปีที่แล้ว +1

    When we start Thinking like a HACKER... we can start to STOP them. Vulnerabilities will be exploited. It is our duty to see that we are not vulnerable in the cyber world. Excellent talk. Totally enjoyed it.

  • @himanshugoel7302
    @himanshugoel7302 ปีที่แล้ว

    This is super amazing Nick. Glad to know you and learn from your experience.

  • @PMA65537
    @PMA65537 5 ปีที่แล้ว +41

    Allan's laws of security
    1 On the whole bad guys can be expected to do what suits them; not what suits you.
    2 Once you have a reasonable security policy the amount of good it does is closely related to your willingness to follow it.
    3 Security is largely about the question "Who's in control".
    4 More restrictive isn't the same as more secure.
    5 People offering something that does the impossible are lying.

    • @lraschellmorton8324
      @lraschellmorton8324 4 ปีที่แล้ว

      One can trust that one can not trust everyone or/and everything?

  • @nandinidash5915
    @nandinidash5915 5 ปีที่แล้ว +10

    valuable explanation of cyber security.

  • @itz_juliannn6702
    @itz_juliannn6702 4 ปีที่แล้ว +2

    I added this to my watch later playlist scrolling through because I thought you were Penn Jillette!!! I was not disappointed!!!

  • @robinhood2508
    @robinhood2508 2 ปีที่แล้ว

    Thank you

  • @matthijstaback6970
    @matthijstaback6970 5 ปีที่แล้ว +3

    I really enjoy Espinosa talking everyone through this so effectively!

  • @westinr6278
    @westinr6278 4 ปีที่แล้ว +1

    Good talk

  • @erhhj5844
    @erhhj5844 2 ปีที่แล้ว +2

    In my opinion this listening is very useful. I can hear that millions of times

  • @ArifAli-hg1eq
    @ArifAli-hg1eq ปีที่แล้ว

    Great talk.

  • @odesso4625
    @odesso4625 4 ปีที่แล้ว

    Important!

  • @ChetanVithlani
    @ChetanVithlani 5 ปีที่แล้ว +6

    Awesome work Nick Espinosa, very useful, simple and effective

  • @viralbangetindo
    @viralbangetindo 4 ปีที่แล้ว +7

    Where is Teller?

  • @Rickety3263
    @Rickety3263 4 ปีที่แล้ว +4

    Please upload again with louder sound levels. This is barely audible

  • @franck-ericdaha9653
    @franck-ericdaha9653 3 ปีที่แล้ว

    I love it

  • @adarilaxmiprasanna9565
    @adarilaxmiprasanna9565 ปีที่แล้ว

    I am very thankful to you sir made my day very interesting and mind peaceful your presentation about cybersecurity and I am got certified certificate in Palo Alto cybersecurity hopefully to explain more about cyber security video

  • @gayan4u
    @gayan4u 2 ปีที่แล้ว +1

    Law 1: If There Is A Vulnerability, It Will Be Exploited.
    Law 2: Everything Is Vulnerable in Some Way
    Law 3 : Humans Trust Even When They Shouldn't.
    Law 4 : With Innovation Comes, Opportunity For Exploitation.
    Law 5: When in Doubt, See Law No. 1

  • @vanavlachopoulou5738
    @vanavlachopoulou5738 4 ปีที่แล้ว

    Nice

  • @brunazanelli2248
    @brunazanelli2248 9 หลายเดือนก่อน

    How much charisma!

  • @huh_wtf
    @huh_wtf 4 ปีที่แล้ว +7

    I thought it was penn from penn and teller

  • @user-pb7ey1dk3y
    @user-pb7ey1dk3y 4 ปีที่แล้ว

    What is the patented feature of Romad antivirus?

  • @ShiuE577
    @ShiuE577 3 ปีที่แล้ว

    Law No.3 Human is by default trust and confiding.

  • @10snoopy1
    @10snoopy1 3 ปีที่แล้ว +1

    I misunderstood trust because I'd be what you call a "mole woman", but I am so glad that I have rediscovered it to learn about cybersecurity threat mitigation techniques

  • @miriammartinez8370
    @miriammartinez8370 3 ปีที่แล้ว +4

    For real I thought it was a magic show.

  • @charlesbyers6911
    @charlesbyers6911 4 ปีที่แล้ว +19

    Law number six, if there is a shirt, it will be un-tucked.

  • @steve00alt70
    @steve00alt70 4 ปีที่แล้ว +12

    everything can be hacked ignorance isnt an excuse anymore in 2019

    • @lraschellmorton8324
      @lraschellmorton8324 4 ปีที่แล้ว +1

      I think the terms are: coerce and manipulation.

  • @j6873
    @j6873 4 ปีที่แล้ว +1

    That's why you should shred unwanted post/mail because hackers can use your name and address to exploit you. "If there is a vulnerability, it will be exploited."

  • @jeremeymanuelpillai1674
    @jeremeymanuelpillai1674 2 ปีที่แล้ว

    I have to do a report on a cyber attack for my course, which one would you recommend I choose, I would like to research an attack which already has plenty of information surrounding it already.

  • @IdowuAkinde
    @IdowuAkinde ปีที่แล้ว

  • @8nimnim8
    @8nimnim8 ปีที่แล้ว

    How can I get the texts of this video?

  • @muzso
    @muzso 2 ปีที่แล้ว

    I'd add to the mix: "the most easily exploitable vulnerability that provides the highest gain (for the attacker) poses the highest threat" (I couldn't get this any shorter :( )

  • @user-kn6vw4sr2r
    @user-kn6vw4sr2r 2 ปีที่แล้ว +3

    The best way to defend yourself from hackers is to never connect to the internet 😂.

  • @obiesoul8320
    @obiesoul8320 3 ปีที่แล้ว +1

    bro bro looks like a bad wizard

  • @RainingYayo
    @RainingYayo 5 ปีที่แล้ว +175

    Can always spot an IT guy a mile away by the way he dresses lol

  • @uccelloarlechio314
    @uccelloarlechio314 3 ปีที่แล้ว

    5:12 bueno... lo de esos 3 es debatible XD.

  • @makavellys
    @makavellys 2 ปีที่แล้ว

    How about the disaster plan that is a part of Cybersecurity? and it's the most important thing???

  • @Bryan_drums
    @Bryan_drums ปีที่แล้ว

    When did Penn Jillette become a cybersecurity expert

  • @innocentrage1
    @innocentrage1 ปีที่แล้ว

    I thought Penn of Penn and Teller lost weight

  • @norrinradd8923
    @norrinradd8923 3 ปีที่แล้ว

    I think my speaker just blew right after he spoke......

  • @michaelgoh9439
    @michaelgoh9439 2 ปีที่แล้ว

    I guess my code that prints hello world is vulnerable

    • @danman6669
      @danman6669 ปีที่แล้ว

      Depending on how you coded it, it could be.

  • @jeromwwhite5577
    @jeromwwhite5577 3 ปีที่แล้ว

    I'm so tired of changing devices and accounts I'm exhausted I was trying to set up my own business but each email and account and device gets hacked, im not crazy just exhausted, can anyone tell me of securing my account outside of 2fa would really appreciate, kind regards
    Jerome

  • @janno04
    @janno04 ปีที่แล้ว

    *No sabia que Penn también era cyber mago* 😂😂😂😂

  • @moazzarts
    @moazzarts 2 ปีที่แล้ว

    Isn't this the guy who was selling Encyclopedia to Joey in Friends? "Are you the decision maker of the house?"

  • @hmmwhatidoxnottoo8459
    @hmmwhatidoxnottoo8459 2 ปีที่แล้ว

    Why did you pen without tellers permission creat MNU.

  • @MrMiss-cp9bw
    @MrMiss-cp9bw 4 ปีที่แล้ว +2

    I hope it was one from his family that woo'ed.
    - That, or the person has to be a -1 year old internet user in his/her 50's.

  • @pablodavidclavijo4609
    @pablodavidclavijo4609 ปีที่แล้ว

    is he going to make teller disappear or not?

  • @RC-dg7rk
    @RC-dg7rk 2 ปีที่แล้ว

    Bisognerebbe discurere ore su quanto detto su, comprensione di sicurezza informatica e estremismi della stessa, doveva essere il provider in primis e le case informatiche a garantire privacy e sicurezza base di protezione, tra hacker e pasticcioni pieni di buona volontà non so chi è peggio. Un esempio, una volta come a tanti entrarono dei disperati hacker e ragazzotti di sicurezza informatica nel computer, mentre il mio unico problema, ansia, terrore, preoccupazione, dalla sua entrata alla sua uscita era quello che mi stava rovinando il lavoro di mezza giornata dei fps e crop di un video corso montaggio, e la cpu che non reggeva, vaglielo a spiegare che nemmeno lo consideravo in quanto tale. Quelle questioni credo andrebbero lasciate alle banche postale che sono disinteressati e professionali. Il mito di Gates Jobs i film che vedavamo da giovani vanno presi come grandi esempi per sognare l'imprenditoria informatica tutto lì. Adesso per la banca eventuali pratiche adopero il miglior sistema di sicurezza mai inventato, adopero la carta, però perchè inventare i computer allora?

  • @n310ea
    @n310ea 4 ปีที่แล้ว

    Hacking always starts with bloatware on your computer installed by OEM.

    • @HarryWizard
      @HarryWizard 4 ปีที่แล้ว

      Unless you don't have an OEM, and bloatware is hardly hacking

    • @n310ea
      @n310ea 4 ปีที่แล้ว

      I don't have OEM, I have Full Version.

    • @HarryWizard
      @HarryWizard 4 ปีที่แล้ว

      @@n310ea then you just have a straight up virus lol bloatware wont come with windows 10

  • @zalvian22
    @zalvian22 4 ปีที่แล้ว +9

    Budget penn...

  • @playmodemedia5391
    @playmodemedia5391 ปีที่แล้ว

    most people believe and trust there politicians, world leaders, medicine etc.. without questioning or doing further research or using plain common sense..

  • @i.c.e.7555
    @i.c.e.7555 3 ปีที่แล้ว

    That’s a massive shirt

  • @thefaltuaadmi
    @thefaltuaadmi ปีที่แล้ว

    Well , he has two apples 🍎

  • @q.tips6981
    @q.tips6981 4 ปีที่แล้ว

    🕸️

  • @installtekzdotcom9777
    @installtekzdotcom9777 4 ปีที่แล้ว

    I trusted you. I looked under my seat..? :/

    • @crisisrampage4124
      @crisisrampage4124 4 ปีที่แล้ว

      One bugger should have took out a 100 bill and shout "hey thanks for this, much appreciated"

  • @CristobalRuiz
    @CristobalRuiz 4 ปีที่แล้ว

    ...and we are all going to die.

  • @IbrahimIbrahim-pe2kq
    @IbrahimIbrahim-pe2kq 4 ปีที่แล้ว

    it's actually 4 laws

  • @superamario6464
    @superamario6464 4 ปีที่แล้ว

    Videos with poor mic quality are so annoying. I dont want to hear every slurp or gulp of air. No thanks.

  • @baileym4708
    @baileym4708 4 ปีที่แล้ว

    Basically exploits are what is hacked and nothing much else to this talk.

    • @valoric4767
      @valoric4767 4 ปีที่แล้ว +2

      Law 3 was about how humans are exploitable. How social engineering is just as a big deal to cyber security as is a vulnerability in software/hardware. Many of the biggest hacks involved someone calling or walking straight into the office/organisation and getting what they needed from gullible employees.

  • @nehalpal1500
    @nehalpal1500 4 ปีที่แล้ว

    He concluded good but what was with his dress sense?

  • @trieulieuf9
    @trieulieuf9 3 ปีที่แล้ว

    3.6b internet users - 700m Chinese internet user, who did not connect to the rest = 2.9b internet users.

  • @alazad816
    @alazad816 3 ปีที่แล้ว

    Share the government inmauritius.riteinmsmpm.leaders

  • @student702
    @student702 4 ปีที่แล้ว +1

    "Illegal" Nuclear Weapons Program?!? By whose definition???
    You just lost me.

  • @ryderkalaris9745
    @ryderkalaris9745 3 ปีที่แล้ว

    The yielding captain chemically tow because cloth spontaneously scratch pace a elastic balance. public, giant bull

  • @zemlakgertrude7229
    @zemlakgertrude7229 3 ปีที่แล้ว

    The lame mass clasically discover because imprisonment likely name in a level success. outgoing, present english

  • @Hermetic_
    @Hermetic_ 4 ปีที่แล้ว +2

    Meh 😑

  • @smg0003
    @smg0003 5 ปีที่แล้ว

    Bet I can make up some exploitable jargon. Why. Well better be public than be a problem
    Hacking could have ghost bits. Ie. A heap of zeros turn up at the CPU and some WiFi or backdoor or side-door built in software/hardware add ones where it sees fit to then exploit the program/software & link running. Scary hey. Took me two minutes to think that up. Imagine what's going on truly!!?

  • @lraschellmorton8324
    @lraschellmorton8324 4 ปีที่แล้ว

    One can trust that one can not trust everyone or/and everything?
    As a citizen of the United States under God but not an extremist, this is sad. But it is so true from a discerning perception especially in this field and in this day and age (A terrorist era).
    REPLY

  • @coenet666
    @coenet666 2 ปีที่แล้ว

    Law 1: buy a suit that fits for god sake.

    • @danman6669
      @danman6669 ปีที่แล้ว +1

      He has so much money, I highly doubt he cares.