The UK’s National Cyber Security Centre (NCSC) launched in 2017. Technical Director Ian Levy explains how the UK’s active cyber defence programme is working at the WIRED Security conference 2017. The country hasn’t yet seen the most severe cyberattack possible against it but it’s only a matter of time.

ABOUT WIRED SECURITY

Hundreds of cybersecurity professionals, business decision makers and technology influencers met at the second WIRED Security event, at Kings Place, London on September 28 2017. Discover some of the fascinating insights from the speakers here: http://wired.uk/ZOgF8z

ABOUT WIRED EVENTS

WIRED events shine a spotlight on the innovators, inventors and entrepreneurs who are changing our world for the better. Explore this channel for videos showing on-stage talks, behind-the-scenes action, exclusive interviews and performances from our roster of events. Join us as we uncover the most relevant, up-and-coming trends and meet the people building the future.

ABOUT WIRED

WIRED brings you the future as it happens – the people, the trends, the big ideas that will change our lives. An award-winning printed monthly and online publication. WIRED is an agenda-setting magazine offering brain food on a wide range of topics, from science, technology and business to pop-culture and politics.

CONNECT WITH WIRED

Web: http://po.st/WiredVideo
Twitter: http://po.st/TwitterWired
Facebook: http://po.st/FacebookWired
Google+: http://po.st/GoogleWired
Instagram: http://po.st/InstagramWired
Magazine: http://po.st/MagazineWired
Newsletter: http://po.st/NewslettersWired

The Advanced Certification Program in Cyber Security and Cyber Defense by IIT Kanpur, in association with TalentSprint, is designed for current and aspiring professionals who are keen to explore and exploit the latest trends in Cyber Security Technologies. A combination of deep academic rigor and intense practical approach will allow participants to master in-demand skills and build world-class expertise.

Visit https://iitk.talentsprint.com/cybersecurity/ to know more about the programme.

If you want to add biometric security features to your Arduino projects, an easy way to do so, is to add a fingerprint sensor module to it. In this video we demonstrate how easy to use a fingerprint sensor with an Arduino Nano and a small display.

I always wanted to try a fingerprint sensor module in order to learn more about its technology and use it in some of my projects in order to add biometric security to them. While searching for a nice and low cost sensor, I discovered this sensor module on Gearbest.com. The sensor costs around 30$ and you can find a link for it in the description of the video. Gearbest.com was kind enough to send a sample unit in order to test it and share my opinion about it with you.

——————–
WHERE TO BUY
——————–

Fingerprint Sensor: http://educ8s.tv/part/FingerprintSensor

Arduino Nano: http://educ8s.tv/part/ArduinoNano

1.44 Color TFT: http://educ8s.tv/part/LCD144

Small Breadboard: http://educ8s.tv/part/SmallBreadboard

Jumper Wires: http://educ8s.tv/part/JumperWires

Power bank Xiaomi: http://educ8s.tv/part/Powerbank

Full disclosure: All of the links above are affiliate links. I get a small percentage of each sale they generate. Thank you for your support!

The fingerprint sensor module is small, and nicely built and it uses some advanced DSP (Digital Signal Processing) chips inside. The sensor works like this. It is an optical sensor, which means it analyzes the photo of a finger. It then renders the image, makes some calculations, finds the features of that finger and then searches in its memory for a fingerprint with the same characteristics. It can achieve all that in less than a second! This module can store up to 1000 fingerprints in its memory and its false acceptance rate is less than 0.001% which makes it pretty secure! Great! We get all that in a very easy to use module and with very low cost! It is a really impressive technology!

In order to demonstrate a simple use of the sensor a built this simple project. I have hooked up the sensor to an Arduino Nano, and I also use the small but very fast 1.44 inch color TFT display. The project asks for a valid fingerprint in order to unlock. When I place my finger on the sensor, it recognizes my finger, turns the fingerprint icon green and it welcomes me. If my girlfriend places her finger on the sensor, it also recognizes her, and displays a welcome message with her name. If I place another finger on the sensor, the project does not unlock the screen. It works fine and you are going to see, you can build this project in less than 10 minutes! Let’s see how to achieve that!

——————–
LIBRARIES
——————–

https://github.com/adafruit/Adafruit-Fingerprint-Sensor-Library

https://github.com/adafruit/Adafruit-GFX-Library

https://github.com/sumotoy/TFT_ILI9163C

——————–
CODE OF THE PROJECT
——————–

Fingerprint Sensor with Arduino

——————–
Quiz of Knowledge Android Game
——————–

You can download my latest Android Game which is called Quiz of Knowledge here:

đź“Ą http://bit.ly/QuizOfKnowledge

——————–
MORE PROJECTS
——————–
Arduino Datalogger: https://www.youtube.com/watch?v=oei3Y6tOhVI
Arduino Weather Station Project: https://www.youtube.com/watch?v=9jN-3DtS1RI
Arduino Nokia 5110 LCD Display: https://www.youtube.com/watch?v=aDwrMeu4k9Y
Arduino OLED display tutorial: https://www.youtube.com/watch?v=A9EwJ7M7OsI
DIY Arduino: https://www.youtube.com/watch?v=npc3uzEVvc0

——————–
ABOUT EDUC8S.TV
——————–
Educ8s.tv is a Youtube channel and website which is dedicated in developing high quality videos about DIY hardware and software projects. In this channel we develop projects with Arduino, Raspberry Pi, we build robots and simple electronic circuits. Check out our website as well for more information: http://www.educ8s.tv

——————–
SUBSCRIBE ON YOUTUBE
——————–

Never miss a video: https://www.youtube.com/subscription_center?add_user=educ8s

#Cybersecurity #Hacking #degree

What’s up #SecurityNinjas!

If you’re considering a degree in Cyber Security, please do the research on the program you’re considering.
Often times schools will advertise their awesome Cyber Security Major, and then it turns out to be a waste of time.

Links to well recognized Cyber programs:

Cyber Operations:

https://www.nsa.gov/resources/students-educators/centers-academic-excellence/

Cyber Defense – by state:
https://www.iad.gov/NIETP/reports/cae_designated_institutions.cfm

Music in this video:
Free Download / Stream: http://ncs.io/ark
Watch: https://youtu.be/8xlDwukxjnA
Song —- Ark
Artist — Ship Wrek & Zookeepers

Rafael Narezzi is a seasoned cybersecurity professional – having worked in a variety of roles, from a cyber-educator to his current role as a cybersecurity advisor and CISO within the UK’s sustainable energy sector.

In this segment of his interview with Echoworx, Rafael explains the importance of providing proactive cyber-education for employees and why an organization needs to steer away from reactive thinking when it comes to security incidents. Rafael also stresses the need to show Board Members at organizations the true value of investing in proactive cybersecurity measures – and the consequences of not doing so.

Echoworx shares your passion for data security. This is no passing fad. Nineteen years ago we created OneWorld, the first smart messaging encryption platform that adapts to any environment. As pioneers who keep on innovating, our product is constantly evolving to solve your challenges.

We live and breathe email encryption. We help protect the way the world communicates.

Check out our website www.echoworx.com

BSides Detroit 13 June 7-8, 2013

Abstract: Evolving threats. Shrinking budgets. More to do. New compliance rules. Where do I start? How do I pick what’s most important? What are my peers doing? How do I get management support? Is security even achievable?The Center for International and Strategic Studies (CSIS) Critical Security Controls for Effective Cyber Defense can help you sort through the chaos and be your roadmap to success, whether you are a small shop, a large organization on its way to ISO 27000, or beholden to NIST 800-53. This consensus driven distillation of critical controls, driven by actual, not theoretical threats, draws from the experiences of not only some of the top commercial forensic investigators but many arms of government including the DoD, FBI, NSA, the Department of State, the Department of Energy Nuclear Laboratories, and more.These controls were formerly known as the SANS 20 Critical Security Controls.

Speaker: Ken Evans

This animation contains a set of high security measures and controls that can be applied across an organisation in order to improve its cyber defence. The controls (and sub-controls) focus on various technical measures and activities, with the primary goal of helping organisations prioritise their efforts to defend against the current most common and damaging computer and network attacks.

Human-monitored security feeds are prohibitively expensive; why not get a Deep Science AI to watch your cameras and detect threats as they happen?

Subscribe to TechCrunch today: http://bit.ly/18J0X2e

TechCrunch is excited to announce the 19 startups pitching in the Startup Battlefield for TechCrunch Disrupt NYC 2017. Over the next three days on the most prestigious tech stage in the world, the Battlefield teams will compete for $50,000 and the coveted Disrupt Cup.

Watch more from Startup Battlefield here: https://www.youtube.com/playlist?list…

TechCrunch Disrupt is the world’s leading authority in debuting revolutionary startups, introducing game-changing technologies and discussing what’s top of mind for the tech industry’s key innovators.

Artificial Intelligence is the Industrial Revolution of our time. Presented by Orli Gan, Head of Product Management and Product Marketing, Threat Prevention at CPX 360.

It is already reshaping our world and is likely to transform practically every facet of our human lives. Learn more here: https://www.checkpoint.com/products/sandblast-network-security/

Fighting cybercrime is one of its many applications. Are AI technologies the silver bullet that the cyber-defense industry has been looking for? As of today, how mature are these technologies? What should you look for in an AI-based security product? Learn about Check Point’s unique advantages in harnessing AI technologies and how already they are built into our threat prevention technologies to offer superior security throughout.

DeVry University Professor Bob Bunge talks about the Pacific Rim Regional Collegiate Cyber Defense Competition and explains how he’s doing his part to train future cyber security warriors.

Cyber Security and Artificial Intelligence.
Jeff Crume, IBM Keynote
Ponencia en Inglés