Cybersecurity Briefing: Sixty Cyber Seconds™ Series
Mission: To provide concise, understandable video clips (60 seconds or less) on a wide variety of cybersecurity topics. Sixty Cyber Seconds™ helps audiences understand, at a high level, the elements of cybersecurity that are relevant to them.
The goal with these videos is to inform audiences and provide enough understanding to think about certain aspects of cybersecurity, planning, and implementation — and to start asking better questions of those responsible for their cyber wellness. Videos will use discussion, examples, and demonstration as needed and as the time format allows. Questions about the topics and requests for specific areas to be covered are welcomed as comments to any video or through our “Contact us” links at Futures-Inc.com.
Topics in the planning phases:
- Email Protections
- Firewall Setups
- Maintaining Your Personal (Cyber) Boundary
- Network Communications
- Open Source Intelligence (OSINT)
- Outer Perimeter
- Phishing For Answers
- Protecting Your Files
- Ransom (A)ware(ness) (And Defense)
- Spoof Me? Well, Spoof You!
- Supply Chain Risks
- The Dark Web
- The Onion Router (TOR)
- The Uses (And Limits) Of Cyber Training
- User Training
- What Can Be ‘Out There’ On You
- What Is ‘MetaData’
- Wireless Networks