Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Want to Improve Cybersecurity? Wargame! Johna Till Johnson, Jerald Murphy, and Donald Vandergriff | Nemertes For cybersecurity organizations that are serious about improving their security stances, cyber-wargaming is no longer a nice-to-have; it’s a need-need... 6 months ago | 28 mins Using the Cyber Table Top (CTT) Process to Perform a Cyber Risk Assessment Katie Premore (Lockheed Martin) The Cyber Table Top (CTT) process was developed in 2014 to support DoD customers who were overwhelmed by the sheer number of findings produced by trad... 2 years ago | 61 mins Combatting Advanced Cybersecurity Threats with AI and Machine Learning Nick Savvides, CTO, Pacific and Japan, Symantec Fictional AI minds like SkyNet in The Terminator and WOPR in WarGames captured our imaginations in the 1980s. Fast forward to the 21st century and no... 6 years ago | 56 mins