Тёмный

Conducting a cybersecurity risk assessment 

IT Governance USA Inc.
Подписаться 2,8 тыс.
Просмотров 88 тыс.
50% 1

Опубликовано:

 

3 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 27   
@4agereligion
@4agereligion Месяц назад
Thanks a lot Sir Clear and concise explanation
@audreymciver4863
@audreymciver4863 5 лет назад
Thank You for your detailed presentation it is greatly appreciated.
@audreymciver4863
@audreymciver4863 5 лет назад
If I knew what company or organization was mine I would go far and beyond my call of duty to maintain compliance. Communication is truly the key. I need to know.
@theaprilrayshow5911
@theaprilrayshow5911 5 лет назад
This is very helpful while I’m in my CYB/100 class this week
@khalilzadjali1747
@khalilzadjali1747 4 года назад
Thank you for the presentation .
@supriyantosp2580
@supriyantosp2580 4 года назад
thank you for you presentation. This is very meaningful for me.
@ZohaibHassanAfridi
@ZohaibHassanAfridi Год назад
Excellent Explanation
@juliodelcid4168
@juliodelcid4168 4 года назад
Great video. Would have been nice to see a ISO 31000 mention, nevertheless great presentation.
@itgovernanceusa
@itgovernanceusa 4 года назад
Thanks - ISO 31000 is indeed a robust risk management standard that provides helpful guidance for those interested in pursuing more in-depth information about risk management.
@queenbeebakardi
@queenbeebakardi 3 года назад
can you please explain a RAR risk assessment report and components
@CyberSecurityII
@CyberSecurityII 3 года назад
Great video.
@itgovernanceusa
@itgovernanceusa 3 года назад
Thanks Ian, please don't forget to subscribe if you haven't already
@audreymciver4863
@audreymciver4863 5 лет назад
I still am questioning why there is a Apple Watch connected to my account? I am not understanding this and the Mac OS. I need answers.
@virenderk4943
@virenderk4943 4 года назад
Risk assessment criteria, kindly add please.
@ITGovernanceLtd
@ITGovernanceLtd 4 года назад
Hi Virender. You can find out more on the criteria in our blog post: www.itgovernance.co.uk/blog/what-is-an-iso-27001-risk-assessment-methodology
@audreymciver4863
@audreymciver4863 5 лет назад
There is no reporting on apple website!
@nitinmore7686
@nitinmore7686 5 лет назад
Thanks. Good presentation!!!
@audreymciver4863
@audreymciver4863 5 лет назад
I don’t know what go to webinar is I only know how to do what I am doing on utube
@audreymciver4863
@audreymciver4863 5 лет назад
Is trusted CI good?
@audreymciver4863
@audreymciver4863 5 лет назад
Is sales force reputable?
@audreymciver4863
@audreymciver4863 5 лет назад
We need to identify microsoft and icloud account take over there is clearly some threat there as I have not been able to do anything with these two for years.
@hmj8469
@hmj8469 4 года назад
Did you ever call Olga Back? LoL
@victoriabennett6312
@victoriabennett6312 2 года назад
the irony is its a cybersecurity topic and now olgas phone number has now been compromised.
@audreymciver4863
@audreymciver4863 5 лет назад
I have nothing to do with Facebook . I did not create Facebook. I did not create Facebook.
@audreymciver4863
@audreymciver4863 5 лет назад
I’m not sure about this new cloud I have many red flags.
@audreymciver4863
@audreymciver4863 5 лет назад
And i don’t understand why i was never informed of any of this.
@ryche.rising
@ryche.rising 3 года назад
What lack of faith about open source software, they actually are more secure, accountable and fixable than black box proprietary software.
Далее
Understanding Cybersecurity Risk Management
34:55
Просмотров 61 тыс.
Китайка нашла Метиорит😂😆
00:21
ISO27001 Risk Assessment Explained
51:54
Просмотров 7 тыс.
Cyber Risk Management: Essentials for the Practical CISO
1:01:10
ISO 27001 vs SOC 2: What’s the difference?
1:01:10
Просмотров 9 тыс.
Conducting an Information Security Risk Assessment
1:04:09
Episode 29: Conducting Site Security Assessments
43:59
Cybersecurity Risk Assessment (Easy Step by Step)
20:34