Instructional Video29:46
The Wall Street Journal

Where to Start in Understanding Your Cyber Risk

Higher Ed
How the latest cyber risks affect your business and how to use that knowledge to start planning a cyber-defense strategy.
Instructional Video31:56
The Wall Street Journal

'Reasonable Security' and the CCPA

Higher Ed
In cybersecurity there is one immutable truth: nothing that touches the Internet is secure. Chris Swecker, formerly of the FBI's criminal investigative and cyber divisions discusses the role of IT compliance.
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Planning

Higher Ed
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Instructional Video0:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Overview

Higher Ed
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video3:28
Seven Dimensions

Proactive Measures for Workplace Security and Safety

Higher Ed
In this video, the speaker emphasizes the importance of being proactive rather than reactive when it comes to workplace security and safety. The video emphasizes the long-term impact of workplace incidents and the benefits of proactive...
Instructional Video29:16
The Wall Street Journal

The Outlook for Growth in Asia

Higher Ed
Japanese Economy Minister Hiroshige Seko and WSJ Editor in Chief Gerard Baker discuss the outlook for Asia's economic growth.
Instructional Video12:33
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell

Higher Ed
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
Instructional Video2:40
The Business Professor

Automatic Perfection of a Security Interest in Goods

Higher Ed
Automatic Perfection of a Security Interest in Goods
Instructional Video29:18
The Wall Street Journal

How to Build a Risk and Threat Intelligence Program

Higher Ed
A risk and threat intelligence program can be incredibly valuable for small and medium-sized businesses in identifying security gaps and improving security controls. Lessons can be learned from global enterprises.
Instructional Video6:42
Espresso Media

Garwin: The History of FAS and the Future of Nuclear Weapons

9th - 12th
Garwin part 8/11: This video features a conversation about the history of the Federation of American Scientists (FAS) and their work in reducing nuclear dangers and advocating for civilian control of nuclear technology. It also discusses...
Instructional Video28:34
The Wall Street Journal

Measuring Security Investments

Higher Ed
How are companies tracking their cybersecurity programs and the return on investment individual elements bring? Thrivent CISO Mary Elizabeth Faulkner explores how organizations can better understand the value their cybersecurity spending...
Instructional Video2:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview

Higher Ed
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Instructional Video1:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Exam Question Review

Higher Ed
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where the correct type of threat actor must be selected. This clip is from the...
Instructional Video18:41
The Wall Street Journal

Don't Be the Weak Link in the Supply Chain

Higher Ed
You're a supplier to a multinational with stringent requirements for the cybersecurity of its supply chain partners. How can you keep them happy and how can you avoid collateral damage from your partners.
Instructional Video10:56
AllTime 10s

10 Most Dangerous Borders

12th - Higher Ed
Some countries are easier to get into than others, and some are outright dangerous. Today Alltime10s takes you through the 10 Most Dangerous Borders in the world.
Instructional Video8:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Service Models

Higher Ed
Cloud computing services are categorized using the term "as a service" (aaS). This episode discusses IaaS, Paas, SaaS, and where responsibility lies for each type of service. This clip is from the chapter "Securing Public Servers" of the...
Instructional Video10:20
Intelligence Squared

Is Nuclear power the future?

Higher Ed
This event took place at the Royal Geographical Society on 15th April 2011.It's got to be nuclear - IQ2 debate highlights
Instructional Video3:54
The Business Professor

Priority in Purchase Money Security Interst in Collateral

Higher Ed
Priority in Purchase Money Security Interst in Collateral
Instructional Video3:26
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Introduction to Machine Learning Tasks

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to give an overview of machine learning tasks. This...
Instructional Video10:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices

Higher Ed
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Instructional Video8:21
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Governance, Management, Standards, and Frameworks

Higher Ed
This video focuses on governance, management, standards, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video21:36
The Wall Street Journal

The Weakest (Supply Chain) Link

Higher Ed
A company's security is only as good as that of its partners that have access to its critical systems. Take a look at how to manage the risks. Plus, examine how to strike the right balance between security and access.
Instructional Video36:50
The Wall Street Journal

How to Buy Cyber Insurance

Higher Ed
In recent months, purchases of cybersecurity insurance have faced soaring premiums and more exclusions to coverage. Robert Parisi, cyber leader at Munich Re, leads this interactive workshop on making a purchase and how to arrive at the...
Instructional Video11:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking

Higher Ed
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...