The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac
An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from small businesses up to the Fortune 100 level. Nick founded Windy City Networks, Inc in 1998 at age 19 and was acquired by BSSi2 LLC in 2013 where he is their CIO. In 2015 Security Fanatics, a Cybersecurity/Cyberwarfare outfit dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched. A nationally recognized speaker, member of the Forbes Technology Council, regular columnist for Forbes, on the Board of Advisors for both Roosevelt University’s Center for Cyber and Information Security and Bits N’ Bytes Cybersecurity Education, award winning co-author of a bestselling book “Easy Prey”, and host of “The Deep Dive” radio show on 101.3FM WHIW, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from small businesses up to the Fortune 100 level. Nick founded Windy City Networks, Inc in 1998 at age 19 and was acquired by BSSi2 LLC in 2013 where he is their CIO. In 2015 Security Fanatics, a Cybersecurity/Cyberwarfare outfit dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched. A nationally recognized speaker, member of the Forbes Technology Council, regular columnist for Forbes, on the Board of Advisors for both Roosevelt University’s Center for Cyber and Information Security and Bits N’ Bytes Cybersecurity Education, award winning co-author of a bestselling book “Easy Prey”, and host of “The Deep Dive” radio show on 101.3FM WHIW, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at www.ted.com/tedx
Пікірлер: 140
Law 1: if there is a vulnerability, it will be exploited. Law 2: Everything is vulnerable in some way Law 3 :Humans can trust when they shouldn't. Law 4 : with innovation comes opportunity for exploitation. Law 5: when in doubt, see law 1
@jadonbaldwin8311
4 жыл бұрын
Thank you!
@arbibushka9406
4 жыл бұрын
Needed this for an assignment, thank you.
@anetharchard2389
3 жыл бұрын
Well summarised
@meCannon
3 жыл бұрын
And low 34?
@kaceronan1830
2 жыл бұрын
Instablaster
I liked this, it's punchy and has an important message without descending into too much jargon.
@NickEspinosa
5 жыл бұрын
Thanks, Jeff! I appreciate the kind words!
Excellent presentation. Recognizing that "everything is vulnerable" is especially important; to some, this may seem paranoid, but it's best to be proactive in this field. Acknowledge the limitations of existing protective measures, assess them, then present new solutions.
@NickEspinosa
5 жыл бұрын
Thanks, Jack!
This amazing to watch. Nick is a remarkable presenter. I was literally draw in from the first line to the last. Great presentation.
Penn? Is that you?
@NickEspinosa
5 жыл бұрын
That's my night job lol. Thanks!
@jacobl.743
4 жыл бұрын
dude I was thinking the same, I was excited to watch Penn talk about cybersecurity
@dorjinphuntsok8271
4 жыл бұрын
Same question.. penn? Is that you.
@erdemsk3023
4 жыл бұрын
Who is Penn?
@erdemsk3023
3 жыл бұрын
@Student Tyler Pullum Thanks!
Such a great presenter.. he makes everything clear and concise
@NickEspinosa
5 жыл бұрын
Thank you! I really appreciate the kind words!
@5710fpilot
2 жыл бұрын
@@NickEspinosa I would love to see this updated for 2022.
Very Informative. Thanks Nick
When we start Thinking like a HACKER... we can start to STOP them. Vulnerabilities will be exploited. It is our duty to see that we are not vulnerable in the cyber world. Excellent talk. Totally enjoyed it.
This is super amazing Nick. Glad to know you and learn from your experience.
In my opinion this listening is very useful. I can hear that millions of times
Thank you
valuable explanation of cyber security.
Allan's laws of security 1 On the whole bad guys can be expected to do what suits them; not what suits you. 2 Once you have a reasonable security policy the amount of good it does is closely related to your willingness to follow it. 3 Security is largely about the question "Who's in control". 4 More restrictive isn't the same as more secure. 5 People offering something that does the impossible are lying.
@lraschellmorton8324
4 жыл бұрын
One can trust that one can not trust everyone or/and everything?
I really enjoy Espinosa talking everyone through this so effectively!
@NickEspinosa
5 жыл бұрын
Thanks, Matthijs!
Good talk
I thought that was the magician Penn
Great talk.
Everyone is making fun of this guy for looking like a magician but in reality he's just an ordinary Penntester
@softaildiaries
4 жыл бұрын
No he's probably just a ordinary millionaire!
@shadynumbers8561
2 жыл бұрын
Pen and teller 😂😂😂
@zsauffi
2 жыл бұрын
penne tester ? 🍝
@rootabeta9015
2 жыл бұрын
@@zsauffi Oh how I wish that were my job title
@VictoriaSobocki
Жыл бұрын
Hahaha
I added this to my watch later playlist scrolling through because I thought you were Penn Jillette!!! I was not disappointed!!!
Important!
Awesome work Nick Espinosa, very useful, simple and effective
@NickEspinosa
5 жыл бұрын
Thanks, Chetan!
Where is Teller?
I am very thankful to you sir made my day very interesting and mind peaceful your presentation about cybersecurity and I am got certified certificate in Palo Alto cybersecurity hopefully to explain more about cyber security video
Please upload again with louder sound levels. This is barely audible
I love it
Law 1: If There Is A Vulnerability, It Will Be Exploited. Law 2: Everything Is Vulnerable in Some Way Law 3 : Humans Trust Even When They Shouldn't. Law 4 : With Innovation Comes, Opportunity For Exploitation. Law 5: When in Doubt, See Law No. 1
How much charisma!
Nice
@nikoletaandriopoulou7377
4 жыл бұрын
It seems nice to me too!!
Law No.3 Human is by default trust and confiding.
I thought it was penn from penn and teller
I misunderstood trust because I'd be what you call a "mole woman", but I am so glad that I have rediscovered it to learn about cybersecurity threat mitigation techniques
That's why you should shred unwanted post/mail because hackers can use your name and address to exploit you. "If there is a vulnerability, it will be exploited."
What is the patented feature of Romad antivirus?
Law number six, if there is a shirt, it will be un-tucked.
everything can be hacked ignorance isnt an excuse anymore in 2019
@lraschellmorton8324
4 жыл бұрын
I think the terms are: coerce and manipulation.
I have to do a report on a cyber attack for my course, which one would you recommend I choose, I would like to research an attack which already has plenty of information surrounding it already.
For real I thought it was a magic show.
♥
I'd add to the mix: "the most easily exploitable vulnerability that provides the highest gain (for the attacker) poses the highest threat" (I couldn't get this any shorter :( )
How about the disaster plan that is a part of Cybersecurity? and it's the most important thing???
How can I get the texts of this video?
When did Penn Jillette become a cybersecurity expert
The best way to defend yourself from hackers is to never connect to the internet 😂.
bro bro looks like a bad wizard
5:12 bueno... lo de esos 3 es debatible XD.
I thought Penn of Penn and Teller lost weight
I'm so tired of changing devices and accounts I'm exhausted I was trying to set up my own business but each email and account and device gets hacked, im not crazy just exhausted, can anyone tell me of securing my account outside of 2fa would really appreciate, kind regards Jerome
I think my speaker just blew right after he spoke......
Why did you pen without tellers permission creat MNU.
is he going to make teller disappear or not?
Bisognerebbe discurere ore su quanto detto su, comprensione di sicurezza informatica e estremismi della stessa, doveva essere il provider in primis e le case informatiche a garantire privacy e sicurezza base di protezione, tra hacker e pasticcioni pieni di buona volontà non so chi è peggio. Un esempio, una volta come a tanti entrarono dei disperati hacker e ragazzotti di sicurezza informatica nel computer, mentre il mio unico problema, ansia, terrore, preoccupazione, dalla sua entrata alla sua uscita era quello che mi stava rovinando il lavoro di mezza giornata dei fps e crop di un video corso montaggio, e la cpu che non reggeva, vaglielo a spiegare che nemmeno lo consideravo in quanto tale. Quelle questioni credo andrebbero lasciate alle banche postale che sono disinteressati e professionali. Il mito di Gates Jobs i film che vedavamo da giovani vanno presi come grandi esempi per sognare l'imprenditoria informatica tutto lì. Adesso per la banca eventuali pratiche adopero il miglior sistema di sicurezza mai inventato, adopero la carta, però perchè inventare i computer allora?
Budget penn...
Can always spot an IT guy a mile away by the way he dresses lol
@unnamedchannel1237
4 жыл бұрын
I don’t dress anything like this?
@theinvisibleworld888
4 жыл бұрын
🤣🤣👏
@Ravi-ds7km
4 жыл бұрын
or by his weight
@evasion4510
4 жыл бұрын
but im like a gentleman
@omniyx7837
2 жыл бұрын
@@Ravi-ds7km unfunny
I hope it was one from his family that woo'ed. - That, or the person has to be a -1 year old internet user in his/her 50's.
Hacking always starts with bloatware on your computer installed by OEM.
@HarryWizard
4 жыл бұрын
Unless you don't have an OEM, and bloatware is hardly hacking
@n310ea
4 жыл бұрын
I don't have OEM, I have Full Version.
@HarryWizard
4 жыл бұрын
@@n310ea then you just have a straight up virus lol bloatware wont come with windows 10
I guess my code that prints hello world is vulnerable
@danman6669
2 жыл бұрын
Depending on how you coded it, it could be.
@eugeniosabater8449
25 күн бұрын
Not my secret paper diary with hidden plans!
most people believe and trust there politicians, world leaders, medicine etc.. without questioning or doing further research or using plain common sense..
*No sabia que Penn también era cyber mago* 😂😂😂😂
Isn't this the guy who was selling Encyclopedia to Joey in Friends? "Are you the decision maker of the house?"
@johnstephensorita8533
2 жыл бұрын
ahhahaha!
it's actually 4 laws
Well , he has two apples 🍎
🕸️
That’s a massive shirt
...and we are all going to die.
Basically exploits are what is hacked and nothing much else to this talk.
@valoric4767
4 жыл бұрын
Law 3 was about how humans are exploitable. How social engineering is just as a big deal to cyber security as is a vulnerability in software/hardware. Many of the biggest hacks involved someone calling or walking straight into the office/organisation and getting what they needed from gullible employees.
I trusted you. I looked under my seat..? :/
@crisisrampage4124
4 жыл бұрын
One bugger should have took out a 100 bill and shout "hey thanks for this, much appreciated"
Videos with poor mic quality are so annoying. I dont want to hear every slurp or gulp of air. No thanks.
3.6b internet users - 700m Chinese internet user, who did not connect to the rest = 2.9b internet users.
He concluded good but what was with his dress sense?
Share the government inmauritius.riteinmsmpm.leaders
"Illegal" Nuclear Weapons Program?!? By whose definition??? You just lost me.
The yielding captain chemically tow because cloth spontaneously scratch pace a elastic balance. public, giant bull
The lame mass clasically discover because imprisonment likely name in a level success. outgoing, present english
Meh 😑
One can trust that one can not trust everyone or/and everything? As a citizen of the United States under God but not an extremist, this is sad. But it is so true from a discerning perception especially in this field and in this day and age (A terrorist era). REPLY
Bet I can make up some exploitable jargon. Why. Well better be public than be a problem Hacking could have ghost bits. Ie. A heap of zeros turn up at the CPU and some WiFi or backdoor or side-door built in software/hardware add ones where it sees fit to then exploit the program/software & link running. Scary hey. Took me two minutes to think that up. Imagine what's going on truly!!?
Law 1: buy a suit that fits for god sake.
@danman6669
2 жыл бұрын
He has so much money, I highly doubt he cares.