Hi, what do you want to do?
Curated Video
How can ISO 27002- 2022 support ISMS certification
In this video, we will explore how ISO 27002-2022 can support ISMS certification. ISO 27002-2022 is a standard that provides guidelines for information security management systems (ISMS). It outlines best practices for managing and...
Curated Video
Support and Operation Domain (ISO 27001)
In this video, we will be discussing the Support and Operation Domain of the ISO 27001 standard. This domain is crucial for ensuring the effective implementation and maintenance of an information security management system. We will cover...
Curated Video
Structure of ISO 27001 2022 Standard
In this video, we will be discussing the structure of the ISO 27001 2022 standard. ISO 27001 is an internationally recognized standard for information security management systems. The 2022 version of the standard has been updated to...
Curated Video
Leadership Domain (ISO 27001)
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...
Curated Video
Context of the Organization (ISO 27001)
In this video, we will be discussing the importance of context of the organization in ISO 27001. Context of the organization refers to the internal and external factors that can impact an organization's information security management...
Curated Video
Why organizations need an ISMS (ISO 27001)
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Curated Video
Setting up an ISMS in ISO 27001
In this video, we will guide you through the process of setting up an Information Security Management System (ISMS) in accordance with the ISO 27001 standard. We will cover the key steps involved in establishing an effective ISMS,...
Curated Video
Introduction to ISO 27001-2022 Standard
In this video, we will be introducing you to the ISO 27001-2022 standard. This standard is a globally recognized framework for information security management. It provides a systematic approach to managing sensitive information and...
Curated Video
Statement of Applicability (SoA) in ISO 27001
In this video, we will be discussing the Statement of Applicability (SoA) in ISO 27001. The SoA is a crucial document that outlines the controls that an organization has implemented to manage their information security risks. We will...
Curated Video
ISO 27001 2022 People controls
In this video, we will be discussing the ISO 27001 2022 People controls. ISO 27001 is a globally recognized standard for information security management systems. The 2022 version of the standard includes updated controls for managing the...
Curated Video
Changes in Annex A 27001 (merged, deleted, and new controls)
In this video, we will be discussing the changes that have been made to Annex A 27001. Annex A 27001 is a set of controls that organizations can implement to ensure the security of their information. Recently, there have been some...
Curated Video
What are the new requirements in ISO 27001:2022
In this video, we will be discussing the new requirements in the upcoming ISO 27001:2022 standard. ISO 27001 is a globally recognized standard for information security management systems, and the new version is set to be released in...
Curated Video
What is ANNEX A in ISo 27001
In this video, we will be discussing Annex A in ISO 27001. Annex A is a crucial component of the ISO 27001 standard, as it outlines the controls that organizations must implement to ensure the confidentiality, integrity, and availability...
National Institute of Standards and Technology
CyberMaryland Summit Part 2
PART 2<br/>
This event was hosted at the National Institute of Standards and Technology, Gaithersburg, MD.
This event was hosted at the National Institute of Standards and Technology, Gaithersburg, MD.
National Institute of Standards and Technology
Information Technology Security For Small Business
Gives small business owners a glimpse into the resources from NIST, SBA, and the FBI that will help protect them from cyber crime. The video describes computer hacking, denial-of-service, laptop theft, insider abuse, computer viruses,...
The Wall Street Journal
Measuring Security Investments
How are companies tracking their cybersecurity programs and the return on investment individual elements bring? Thrivent CISO Mary Elizabeth Faulkner explores how organizations can better understand the value their cybersecurity spending...
The Wall Street Journal
The Weakest (Supply Chain) Link
A company's security is only as good as that of its partners that have access to its critical systems. Take a look at how to manage the risks. Plus, examine how to strike the right balance between security and access.
The Wall Street Journal
Reinforcing the Supply Chain
High-profile incidents have shown companies that they are vulnerable to attacks on technology supply chains. Cyber leaders from NYSE and Foley & Lardner show companies what they can do to improve security and the response to attacks.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The 4 CISM domains
Introduction: The 4 CISM domains
r/>
This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want to get your...
r/>
This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want to get your...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - CISM Domain 1 - What we will be covering
CISM Domain 1: Information Security Governance: CISM Domain 1 - What we will be covering
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
Global Ethics Solutions
Cyber Ethics in a Real World
When using your company’s computer, it is important to remember that it is owned by your employer. This means that they have a right to monitor or view anything that you do on that computer. As an employee, you have a responsibility to...
Curated Video
Shutdown Any WiFi Network
In this tutorial, you will learn how to jam nearby WiFi signals and how disconnect authenticated users from them.
Bloomberg
U.S. Adversaries Have Ability to Destroy Networks: Henry
Dec. 18 -- CrowdStrike President Shawn Henry discusses the Sony hack attack. He speaks on Street Smart.
Bloomberg
Businesses Spending More on Cyber Security: Mokady
Dec. 5 ""Cyberark Chief Executive Officer Udi Mokady discusses the performance of their IPO and the demand for cyber security. He speaks with Elliot Gotkine on Bloomberg Televisions The Pulse. (Source: Bloomberg)