公式動画ピックアップ
AAPL
ADBE
ADSK
AIG
AMGN
AMZN
BABA
BAC
BL
BOX
C
CHGG
CLDR
COKE
COUP
CRM
CROX
DDOG
DELL
DIS
DOCU
DOMO
ESTC
F
FIVN
GILD
GRUB
GS
GSK
H
HD
HON
HPE
HSBC
IBM
INST
INTC
INTU
IRBT
JCOM
JNJ
JPM
LLY
LMT
M
MA
MCD
MDB
MGM
MMM
MSFT
MSI
NCR
NEM
NEWR
NFLX
NKE
NOW
NTNX
NVDA
NYT
OKTA
ORCL
PD
PG
PLAN
PS
RHT
RNG
SAP
SBUX
SHOP
SMAR
SPLK
SQ
TDOC
TEAM
TSLA
TWOU
TWTR
TXN
UA
UAL
UL
UTX
V
VEEV
VZ
WDAY
WFC
WK
WMT
WORK
YELP
ZEN
ZM
ZS
ZUO
公式動画&関連する動画 [Protecting Civilization | Cybersecurity Critical Infrastructure | Powered by Cisco]
In this powerful and insightful session, Joe Marshall, Senior Security Strategist and Threat Researcher at Cisco Talos, takes you on a journey into the world of cybersecurity for critical infrastructure — the invisible systems that keep our modern society running.
From the power grid and clean water to global shipping and factory automation, Joe explains how these systems are targeted by cyber threats and why YOU could be the next generation of defenders.
Whether you’re a NetAcad student, a tech enthusiast, or just curious about cybersecurity, this session will open your eyes to the threats — and the exciting careers — waiting in industrial cybersecurity.
📌 What You’ll Learn
• What is Cisco Talos and what does a threat researcher do?
• Why critical infrastructure is the backbone of civilization
• Real cyber threats: from Ukraine to hacked shipping cranes
• How systems like robotic arms, power grids, and water plants are vulnerable
• The structure of ICS/OT networks — including the Purdue Model
• A preview of infamous cyberattacks like Stuxnet and Industroyer
• Career advice and “homework” to keep learning!
🎓 Learn More
Explore free courses and career resources at Cisco Networking Academy http://cs.co/900023IDu
📌 Chapters
00:00 – Meet Joe Marshall: Cisco Talos Threat Researcher
02:37 – What is Cisco Talos?
05:56 – Understanding Critical Infrastructure
08:00 – Real-World ICS in Action
13:45 – Why ICS is Insecure by Design
17:00 – Real Threats: Ukraine, Ports & GPS Hacks
19:00 – Cybersecurity vs Industrial History
21:00 – Legacy Tech, Long Lifespans, and Big Challenges
22:00 – Geopolitics and Nation-State Cyber Attacks
24:00 – Cyber Attacks During War: Ukraine Case Study
26:00 – Stuxnet: A Watershed Cyber Attack
28:30 – BlackEnergy: The First Power Grid Cyberattack
31:00 – Industroyer: When It Happened Again
33:30 – Triton/Trisis: Hacking Safety Systems
36:30 – Real-World Defense: Project Power Up
38:30 – Why You Should Care (and Get Involved)
40:30 – Career Advice & Closing Words
👩💻 Want to start your journey in tech?
Check out the rest of the “Find Yourself in the Future” series to learn about AI, networking, cybersecurity, and more! http://cs.co/900923IzW
👍 Don’t forget to like, subscribe, and share this video with anyone interested in a tech career!
#Cybersecurity #Cisco #TechCareers #FindYourselfInTheFuture #NetworkingAcademy #WomenInTech #CyberJobs
21229
917