Curated Video
Threats and Vulnerabilities
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Curated Video
Risk Assessment Approaches
The tutorial introduces two main types of risk assessment methodologies: quantitative and qualitative
Curated Video
The Big Picture
The video presents the big picture of risk management along with introducing a dashboard that can be adopted by businesses to monitor their risk thresholds
Curated Video
Why organizations need an ISMS (ISO 27001)
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Curated Video
How can ISO 27005:2022 support your ISMS certification
In this video, we will explore how ISO 27005:2022 can support your ISMS certification. ISO 27005:2022 is a risk management standard that provides guidelines for information security risk management. By implementing ISO 27005:2022, you...
Curated Video
Information security for use of cloud services control
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Curated Video
Leadership Domain (ISO 27001)
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...
Curated Video
Context of the Organization (ISO 27001)
In this video, we will be discussing the importance of context of the organization in ISO 27001. Context of the organization refers to the internal and external factors that can impact an organization's information security management...
The Wall Street Journal
Guaging Investor Priorities
With climate disclosure rules from the U.S. Securities and Exchange Commission due to come into effect soon, SEC alumni Satyam Khanna and Kelly Gibson discuss how the commission has been working with companies and preparing for enforcement.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...
Seven Dimensions
Assess Psychological Safety in your Workplace
This video emphasizes the significance of regularly evaluating the level of psychological safety in a team or organization. Once the data is collected, the speaker advises sharing it with the team and collaboratively addressing any...
Sustainable Business Consulting
Resiliency in Reporting and the CDP
Description of current trends in sustainability reporting and a look into CDP disclosure questions
The Wall Street Journal
Insights from Third Party Cyber Risk Management
Cyber experts from Los Angeles World Airports and Enclave Security lead a workshop aimed at helping risk and compliance professionals take their third-party cyber risk management program to the next level and reduce risk.
The Wall Street Journal
Effective Risk Measurement and Reporting
Enterprise Risk Management efforts often fall short in accurately measuring risk and clear reporting of those metrics to senior management and the board. This workshop focuses on techniques to improve the flow of risk information to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Defining Risk
Managing risk involves identifying threat actors from script kiddies to state-sponsored attackers. Mitigating threats is achieved by identifying assets and putting security controls in place to mitigate risks. This clip is from the...
Seven Dimensions
Creating Psychological Safety in the Workplace
In this video, Peter discusses the role of a leader in ensuring psychological safety within a team. He emphasizes the importance of leading by example and exhibiting behaviors such as active listening, avoiding negativity, and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Ask Me Anything (AMA)
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism. This clip is from the chapter "Risk Management" of the...
Seven Dimensions
Paths to a Psychologically Safe Workplace
In this video, you will learn to develop a psychologically safe organization or team where people feel safe to speak up, point out problems and tell the truth. It’s an essential pre-requisite for a high performance team and results in...
Sustainable Business Consulting
Brand Threats
How to asses brand threats to your organization and how incorporating sustainability can help you minimize these threats to your company
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 -...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2
This video explains NIST SP 800-37 revision 1 and 2. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security...
The Wall Street Journal
Focusing on Bank Risks
The main regulator of U.S. banks is putting a new emphasis on climate risk. Michael Hsu, acting head of the Office of Comptroller of the Currency will lay out what this scrutiny means for risk management and how it intersects with other...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Domain 1 - What We will Be Covering
This video explains what you will be learning in this section. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain...
Mazz Media
The Relationship Between Data and Technology Management
Data management is highly dependent on technology and intersects with technology management, but it involves separate, non-technical activities. What does data management involve, given this definition? This video explores how data...