Curated Video
How we Work: Geert Hofstede's 6 Cross-Organization Cultural Dimensions
In the 1980s, the Dutch cultural psychologist Geert Hofstede returned to the study of culture, but focused on an analysis of organizational practices. The authors identified six cross-organizational dimensions that separate and define...
Curated Video
Power in Organizations: The Power of Governance
In this video, we will look at the power organizations derive from their governance structures and processes.
Curated Video
Henry Mintzberg's 4 plus 2 Organizational Types
In his 1979 book, The Structuring of Organizations, Henry Mintzberg classified organizational structures into four organizational types, depending on the complexity of the organization’s operations, and the pace of change it needs to...
Curated Video
What Happens To Your Mind if You Don't Sleep
What happens to your mind if you don't sleep? Not enough sleep affects your memory. One of the things that can happen if you don’t sleep it changes your thinking abilities and impairs your memory. The first way sleep deprivation impairs...
The Business Professor
Types of Organizational Learning
What are the Types of Organizational Learning? single loop, double loop, deutero learning, Organizational learning theory is a branch of organizational studies that seeks to understand how organizations acquire and use knowledge to...
Vlogbrothers
Health Care Overhaul Summarized Via MASSIVE PIG
In which John sweats through his shirt while discussing the American health care system and various proposals for reform, including the public option, nonprofit health insurance cooperatives, and continuing to feed the pig.
Curated Video
Introduction to IT and Cybersecurity: Application Security Controls
Part 15/16 of Introduction to IT and Cybersecurity series: This video provides an overview of security controls that are implemented in applications. The speaker explains the three types of controls: input controls, processing controls,...
Curated Video
Types of project risks and how to prepare a contingency plan
This video discusses types of project management and the importance of preparing a contingency plan for business projects. The video explains the various risks associated with business projects, including budget, schedule, and...
Curated Video
SOC 2 | Everything you need to know
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Curated Video
Transition from ISO 27001-2013 to ISO 27001-2022 controls
In this video, we will be discussing the transition from ISO 27001-2013 to ISO 27001-2022 controls. ISO 27001 is a globally recognized standard for information security management systems. The 2013 version of the standard has been in use...
Curated Video
Why organizations need an ISMS (ISO 27001)
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Curated Video
MITRE ATTACK for iPhone
In this video, we will be discussing MITRE ATTACK for Mobile Applications. MITRE ATT&CK is a globally recognized framework that helps organizations understand and categorize various types of cyber threats. In this video, we will be...
Curated Video
ISO 27001- 2022 Organizational controls
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Curated Video
Data leakage prevention control
In this video, we will be discussing data leakage prevention control. Data leakage is a serious concern for businesses of all sizes, as it can lead to the loss of sensitive information, financial loss, and damage to a company's...
Curated Video
Information deletion control
In this video, we will be discussing the importance of information deletion control. With the increasing amount of data being collected and stored, it is crucial to have proper measures in place to ensure that sensitive information is...
Curated Video
Configuration management control
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Curated Video
ISMS policy example
In this video, we will be discussing an example of an ISMS policy. An ISMS policy is a set of guidelines and procedures that an organization follows to ensure the confidentiality, integrity, and availability of its information assets. We...
Curated Video
Leadership Domain (ISO 27001)
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...
Curated Video
Context of the Organization (ISO 27001)
In this video, we will be discussing the importance of context of the organization in ISO 27001. Context of the organization refers to the internal and external factors that can impact an organization's information security management...
Curated Video
Setting up an ISMS in ISO 27001
In this video, we will guide you through the process of setting up an Information Security Management System (ISMS) in accordance with the ISO 27001 standard. We will cover the key steps involved in establishing an effective ISMS,...
Curated Video
ISO 27001 2022 Physical controls
In this video, we will be discussing the physical controls outlined in the ISO 27001 2022 standard. Physical controls are an essential aspect of information security, as they help protect against physical threats such as theft, damage,...
Science360
Airplane disease transmission!
There’s nothing like being stuffed into a cramped, hot airplane cabin to make you feel sick. NSF-funded researchers at Florida State University say passenger movement patterns in these cabins actually can make you sick. In response to...
Mazz Media
Lab Safety: Radiation (Safety Procedures)
In this live-action program viewers will learn overexposure to radiation can cause serious biological and environmental damage and this means that mandatory safety procedures must be followed at all times. Students will come to...
Executive Finance
Introduction to Cryptocurrency and Ethical Decision Making in the Industry
The video is an introductory lesson for a course on cryptocurrency. The teacher shares their personal experience in the crypto space, starting from the early days of Bitcoin to the emergence of new investment opportunities. The lesson...