Instructional Video13:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 1

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video15:42
National Institute of Standards and Technology

Patrick Gallagher Keynote, NIST Cloud Computing Forum and Workshop IV

9th - 12th
NIST Director Patrick Gallagher speaks at the November 2-4, 2011 Cloud Computing Forum and Workshop IV, held at NIST in Gaithersburg. MD. He announces the public draft of the U.S. Government Cloud Computing Roadmap and provides...
Instructional Video34:28
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 5

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC. ...
Instructional Video8:08
National Institute of Standards and Technology

Cybersecurity Framework Overview Jane Holl Lute

9th - 12th
DHS Security Deputy Secretary Jane Holl Lute lays out how DHS is implementing its role in the Cybersecurity and Critical Infrastructure Framework. Working groups will focus on incentives, collaboration and information exchange.
Instructional Video15:38
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 9

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video41:09
National Institute of Standards and Technology

Launch of the National Cybersecurity Center of Excellence

9th - 12th
At a news briefing held on Feb. 21, 2012, the National Institute of Standards and Technology (NIST) announced the launch of the National Cybersecurity Center of Excellence, a public-private collaboration for accelerating the widespread...
Instructional Video1:26:43
National Institute of Standards and Technology

Forum on National Strategy for Trusted Identities in Cyberspace

9th - 12th
This forum on the National Strategy for Trusted Identities in Cyberspace (NSTIC) was held at Stanford University on January 7, 2011. It featured presentations by Commerce Secretary Gary Locke and White House Cybersecurity Coordinator...
Instructional Video23:53
Globalive Media

Beyond Innovation: Episode 7

Higher Ed
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
Instructional Video30:46
The Wall Street Journal

WSJ Pro Cybersecurity: Maintaining Digital Trust

Higher Ed
Learn how governments, critical infrastructure organizations and the business community can work together to manage cyber risk and avoid the financial, legal, operational and reputational impact that follows a cyberattack.
Instructional Video17:30
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy-Segment 2

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video23:54
Globalive Media

Beyond Innovation: Episode 8

Higher Ed
Blockchain gives the smart grid a jolt, an AI spots imposters and an algorithm optimizes insurance coverage. Plus, Anthony and Michael speak with the entrepreneur pioneering a friendlier alternative to Facebook. Hosted by venture...
Instructional Video9:13
National Institute of Standards and Technology

Cybersecurity Framework Overview Pat Gallagher

9th - 12th
NIST Director Patrick Gallagher says that the Cybersecurity and Critical Infrastructure Frame-Cybersecurity and Critical Infrastructure Frame-work needs the owners and operators of critical infrastructure to make best possible decisions...
Instructional Video2:00
National Institute of Standards and Technology

National Strategy for Trusted Identities in Cyberspace (NSTIC)

9th - 12th
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...
Instructional Video7:22
National Institute of Standards and Technology

Cybersecurity Framework Workshop Rebecca Blank

9th - 12th
Commerce Deputy Secretary Rebecca Blank calls for industry to work with NIST in partnership to develop a voluntary framework that will promote best practices at critical infrastructure facilities and businesses to keep the U.S. safe.
Instructional Video7:54
National Institute of Standards and Technology

What is the Internet of Things (IoT) and how can we secure it?

9th - 12th
Industry leaders discuss cybersecurity concerns around the Internet of Things (IoT) and the role NIST (https://go.usa.gov/xPzuY) can play to help secure our future. Featuring thought leaders from: Global Cyber Alliance Symantec Cisco...
Instructional Video17:54
National Institute of Standards and Technology

Steve VanRoekel Keynote, NIST Cloud Computing Forum and Workshop IV

9th - 12th
Federal Chief Information Officer Steve VanRoekel gives his second speech in that role at the November 2-4, 2011 Cloud Computing Forum and Workshop, held at the National Institute of Standards and Technology in Gaithersburg. MD. At the...
Instructional Video1:05
Next Animation Studio

TikTok secretly collected users’ MAC addresses: report

12th - Higher Ed
TikTok engaged in a banned data-collecting process that harvested highly personalized information from its users for more than a year, an investigation by the Wall Street Journal has found.
Instructional Video28:14
The Wall Street Journal

How To Protect Your Company Without Breaking the Bank

Higher Ed
How do you make best use of the resources you have and what outside help can you get that matches your cyber risks?
Instructional Video17:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 7

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video20:15
The Wall Street Journal

The Scope of Threat

Higher Ed
At the WSJ D.Live conference in Hong Kong, Darktrace's Nicole Eagan and Social Data Lab's Andreas Weigend speak with WSJ Global Technology Editor Jason Dean about risks and vulnerabilities in the 'Wild Wild West' digital realm.
Instructional Video2:20
APMonitor

Introduction to OT Cybersecurity

10th - Higher Ed
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Instructional Video16:34
National Institute of Standards and Technology

Vint Cerf: The past, present and future of the internet

9th - 12th
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Instructional Video19:31
The Wall Street Journal

Eating Everything

Higher Ed
Joseph Tsai, executive vice chairman of Alibaba, talks with WSJ Global Technology Editor Jason Dean about competing with Amazon and venturing into new areas beyond e-commerce at the WSJ D.Live conference in Laguna Beach, Calif.
Instructional Video29:25
The Wall Street Journal

How Multinational Companies Run Global Cybersecurity Programs

Higher Ed
Michael McNeil of McKesson and Kevin Tierney of General Motors discuss how to manage global cybersecurity programs, and share their insights on the best ways to organize for security.