CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

The Defenders

2 min read
in Entertainment, Movie

The Defenders is a behind-the-scenes look at four famous cyber attacks and the incredible people tasked with keeping our institutions safe from ever-evolving cyber threats.

LONDON 2012 SUMMER OLYMPICS

During the London 2012 Summer Olympics, six serious cyber threats occurred. One included a threat to the power systems the morning of the opening ceremony. Although nothing transpired from the threat, the Olympic committee had a plan of action and was well prepared for an attack. Hear from Oliver Hoare, former Head of Cybersecurity, London 2012 Summer Olympics on how his team was able to prepare for this scenario.

THE NEW YORK TIMES

On October 25, 2015, The New York Times published an article that found relatives of China’s Prime Minister Wen Jiabao had accumulated billions of dollars of wealth through influenced business dealings. Following this, Chinese nation-state hackers breached The New York Times systems by installing malware and gaining access to passwords and computers. Mike Higgins, Former CISO, The New York Times and Nicole Perlroth, Senior Reporter, The New York Times share the inside story of how they uncovered the attack.

SAN FRANCISCO MUNI

The Muni transit system in San Francisco was hacked during Black Friday weekend in 2016. The hackers were asking for 100 bitcoin or $73,000 as fare systems went out of service, and commuters could not buy tickets to ride on the Muni. Lisa Walton, CIO of Muni shares her perspective on how her team recovered from this attack.

SONY PICTURES

Leading up to the release of The Interview, the hacker group “Guardians of Peace” which is affiliated with North Korea confiscated confidential employee and production information. Five movies, hundreds of social security numbers, and thousands of emails were released to the public. This was the first offensive cyber attack against the United States from another nation state ever. Former Chief of Staff to Secretary of Defense Ash Carter, Eric Rosenbach shares how the White House and Department of Defense tackled this tricky diplomatic situation.

 

 

Visit Website

Related

Tags: CorporationsCorporations EntertainmentCorporations MoviesCyber CitizensEntertainmentMoviesThe Defenders
6
VIEWS
ADVERTISEMENT

Related Posts

7 Podcast about Threat Hunting

7 Podcast about Threat Hunting

August 2, 2022
5 Podcast about Business Continuity

5 Podcast about Business Continuity

August 2, 2022
Application Security podcast. SAST, DAST, and IAST. Oh My! (S03E05)

Application Security podcast. Ochaun Marshall — IaC and SAST

July 29, 2022
Application Security podcast. SAST, DAST, and IAST. Oh My! (S03E05)

Application Security podcast. SAST, DAST, and IAST. Oh My! (S03E05)

July 29, 2022

More Articles

Alerts

CISA released Security Advisory on MiCODUS MV720 GPS Tracker

July 19, 2022

Ursnif Banking Trojan

March 9, 2021
Document

SANS 2021 Automation and Integration Survey

April 29, 2022
Alerts

Dell Security Advisory

October 5, 2021
Certification

CompTIA CySA+

November 10, 2020

Defense in depth

March 27, 2021
Quotes

“A DevOps engineer at one company…”

January 25, 2022
Cyber101

Nonaffiliated Third Party

June 7, 2022
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.