Тёмный

ISO 27001 Clause 6.1.2 Information security risk assessment process in Hindi 

Luv Johar Free IT Training Videos
Подписаться 17 тыс.
Просмотров 2,7 тыс.
50% 1

Опубликовано:

 

29 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 15   
@merazhussain6022
@merazhussain6022 Год назад
Brilliant video
@LearnITSecuritywithLuvJohar
thanks brother
@sumitsachan499
@sumitsachan499 2 года назад
Thanku for valuable information
@LearnITSecuritywithLuvJohar
thanks, please keep watching and share if you like this video :)
@prachiprabhu4280
@prachiprabhu4280 2 года назад
Does the risk register needs to be asset based only. Or we can make process based also
@LearnITSecuritywithLuvJohar
A risk register is a tool used to identify, evaluate, and manage risks in an organization. It can be asset-based, process-based, or a combination of both. An asset-based risk register identifies risks associated with specific assets, such as equipment, systems, or data. This type of risk register is useful when managing risks related to physical or technological assets, and can help prioritize risks based on their potential impact on those assets. A process-based risk register, on the other hand, identifies risks associated with specific business processes, such as supply chain management or financial reporting. This type of risk register is useful when managing risks related to organizational processes and can help prioritize risks based on their potential impact on business operations. It's important to note that a risk register doesn't need to be limited to one approach or the other. In fact, a combination of asset-based and process-based risk registers can provide a more complete picture of an organization's risks, allowing for more effective risk management. Ultimately, the choice of an asset-based, process-based, or hybrid risk register depends on the specific needs and goals of the organization. It's important to consider the nature of the organization's operations, the types of risks it faces, and the resources available for risk management when deciding on the appropriate approach for the risk register.
@vandnaenterprises6312
@vandnaenterprises6312 Год назад
Soc1 and SoC 2 Hindi me banye, and implementation and audit technic in Hindi, Hindi me video agar hoga to concept clear ho jata and we can able to explain during interview
@LearnITSecuritywithLuvJohar
thanks, please keep watching and share if you like this video :)
@vandnaenterprises6312
@vandnaenterprises6312 Год назад
Sir please create a video on ITGC in Hindi complete implementation and how to test the ITGC controls ,please
@LearnITSecuritywithLuvJohar
thanks, please keep watching and share if you like this video :)
@pooruberry4529
@pooruberry4529 2 года назад
Hi luv. Can you show some practicals on this topic.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 года назад
Sure, examples and practicals will make all these clauses clear, let me complete all requirements first, including all Annex A controls, then we will surely look at everything in depth
@pooruberry4529
@pooruberry4529 2 года назад
@@LearnITSecuritywithLuvJohar thank you Luv.
@onlyforsale6187
@onlyforsale6187 2 года назад
Can please give your lecture in English
@LearnITSecuritywithLuvJohar
thanks, please keep watching and share if you like this video :)
Далее
Practical Risk Assessment and Mitigation
1:09:09
Просмотров 68 тыс.
Conducting a cybersecurity risk assessment
52:42
Просмотров 88 тыс.
ISO27001 Risk Assessment Explained
51:54
Просмотров 8 тыс.
Implementing ISO 27001 in an organization with Kavitha
49:32