Curated Video
SOC 2 | Everything you need to know
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Curated Video
Security Best Practices
This video will help you follow a cyber security hygiene in your personal and business life
Curated Video
Famous Cyber Security Frameworks
Users need standards for information technology (IT) systems in order to use IT successfully and run their organizations' operations. To connect goods created by several suppliers and transfer software, data, and applications from one...
Curated Video
Introduction to IT and Cybersecurity: Privacy and GDPR
Part 16/16 of Introduction to IT and Cybersecurity series: The video is a discussion on the importance of privacy and how it is protected by laws and regulations, particularly the General Data Protection Regulation (GDPR) in the European...
Curated Video
Introduction to IT and Cybersecurity: Enterprise Resource Planning (ERP)
Part 11/16 of Introduction to IT and Cybersecurity series: The video discusses ERP (Enterprise Resource Planning) software. The video highlights SAP and Oracle as the two leading providers of ERP software with the highest market share.
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Other Visualization Tools (HighCharts, D3, and More)
This video explains the other visualization tools in Amazon QuickSight. This clip is from the chapter "Domain 5: Visualization" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn how to...
Curated Video
ICT readiness for business continuity control
In this video, we will be discussing the importance of ICT readiness for business continuity control. With the increasing reliance on technology in today's business world, it is crucial to have a plan in place to ensure that your...
Curated Video
Mapping ISO 27001-2022 controls to NIST CSF subcategories
In this video, we will explore the process of mapping ISO 27001-2022 controls to NIST CSF subcategories. ISO 27001-2022 is a widely recognized standard for information security management, while NIST CSF is a framework that provides...
Curated Video
What has been added and removed from the ISO 27001 standard
In this video, we will be discussing the changes that have been made to the ISO 27001 standard. We will be exploring what has been added and removed from the latest version of the standard, and how these changes may impact your...
Curated Video
Support and Operation Domain (ISO 27001)
In this video, we will be discussing the Support and Operation Domain of the ISO 27001 standard. This domain is crucial for ensuring the effective implementation and maintenance of an information security management system. We will cover...
Curated Video
Structure of ISO 27001 2022 Standard
In this video, we will be discussing the structure of the ISO 27001 2022 standard. ISO 27001 is an internationally recognized standard for information security management systems. The 2022 version of the standard has been updated to...
Curated Video
Why organizations need an ISMS (ISO 27001)
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Curated Video
Statement of Applicability (SoA) in ISO 27001
In this video, we will be discussing the Statement of Applicability (SoA) in ISO 27001. The SoA is a crucial document that outlines the controls that an organization has implemented to manage their information security risks. We will...
Curated Video
ISO 27001 2022 People controls
In this video, we will be discussing the ISO 27001 2022 People controls. ISO 27001 is a globally recognized standard for information security management systems. The 2022 version of the standard includes updated controls for managing the...
Mister Simplify
PRINCE2 Project Management Basics - Simplest Explanation Ever
PRINCE 2 is the leading Project Management framework used the world over to manage projects of various sizes and complexities. PRINCE 2 has 2 qualifications - The PRINCE 2 Foundation and the PRINCE 2 Practitioner. This video tries to...
Mister Simplify
McGregor XY Theory of Management - Simplest Explanation Ever
McGregor's Theory of Management is one of the fundamental motivational theories management which ties human psychology with management. We look at theory x and theory y and simplify the concept for you.
Mister Simplify
Lewin's Force Field Analysis Model - Simplest Explanation Ever
Change Management is always a challenging aspect of running a business and derive profit out of it. Lewin's Force Field Analysis Model lends a helping hand to businesses when it comes to weighing the prospect of change management in...
Mister Simplify
Handy's Organisational Culture Model - Simplest Explanation Ever
Charles Handy's Model is a way to categorise organisational cultures. Understanding organisational cultures goes a long way in ensuring employee satisfaction and motivation in business today.
Curated Video
Monitoring activities control
In this video, we will be discussing the importance of monitoring activities control in any organization. We will explore the various methods and tools used to monitor and control activities, including software solutions and manual...
Curated Video
Data leakage prevention control
In this video, we will be discussing data leakage prevention control. Data leakage is a serious concern for businesses of all sizes, as it can lead to the loss of sensitive information, financial loss, and damage to a company's...
Curated Video
Configuration management control
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Curated Video
Physical security monitoring control
In this video, we will be discussing physical security monitoring control. We will explore the importance of physical security in protecting your assets and how monitoring control can help you achieve this. We will also discuss the...
Curated Video
Information security for use of cloud services control
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Curated Video
Threat intelligence control
In this video, we will be discussing the importance of threat intelligence control in today's digital landscape. With cyber threats becoming more sophisticated and frequent, it is crucial for organizations to have a proactive approach to...