The Wall Street Journal
Where to Start in Understanding Your Cyber Risk
How the latest cyber risks affect your business and how to use that knowledge to start planning a cyber-defense strategy.
The Wall Street Journal
'Reasonable Security' and the CCPA
In cybersecurity there is one immutable truth: nothing that touches the Internet is secure. Chris Swecker, formerly of the FBI's criminal investigative and cyber divisions discusses the role of IT compliance.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Planning
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Overview
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Seven Dimensions
Proactive Measures for Workplace Security and Safety
In this video, the speaker emphasizes the importance of being proactive rather than reactive when it comes to workplace security and safety. The video emphasizes the long-term impact of workplace incidents and the benefits of proactive...
The Wall Street Journal
The Outlook for Growth in Asia
Japanese Economy Minister Hiroshige Seko and WSJ Editor in Chief Gerard Baker discuss the outlook for Asia's economic growth.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
The Business Professor
Automatic Perfection of a Security Interest in Goods
Automatic Perfection of a Security Interest in Goods
The Wall Street Journal
How to Build a Risk and Threat Intelligence Program
A risk and threat intelligence program can be incredibly valuable for small and medium-sized businesses in identifying security gaps and improving security controls. Lessons can be learned from global enterprises.
Espresso Media
Garwin: The History of FAS and the Future of Nuclear Weapons
Garwin part 8/11: This video features a conversation about the history of the Federation of American Scientists (FAS) and their work in reducing nuclear dangers and advocating for civilian control of nuclear technology. It also discusses...
The Wall Street Journal
Measuring Security Investments
How are companies tracking their cybersecurity programs and the return on investment individual elements bring? Thrivent CISO Mary Elizabeth Faulkner explores how organizations can better understand the value their cybersecurity spending...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 1 Exam Question Review
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where the correct type of threat actor must be selected. This clip is from the...
The Wall Street Journal
Don't Be the Weak Link in the Supply Chain
You're a supplier to a multinational with stringent requirements for the cybersecurity of its supply chain partners. How can you keep them happy and how can you avoid collateral damage from your partners.
AllTime 10s
10 Most Dangerous Borders
Some countries are easier to get into than others, and some are outright dangerous. Today Alltime10s takes you through the 10 Most Dangerous Borders in the world.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cloud Service Models
Cloud computing services are categorized using the term "as a service" (aaS). This episode discusses IaaS, Paas, SaaS, and where responsibility lies for each type of service. This clip is from the chapter "Securing Public Servers" of the...
Intelligence Squared
Is Nuclear power the future?
This event took place at the Royal Geographical Society on 15th April 2011.It's got to be nuclear - IQ2 debate highlights
The Business Professor
Priority in Purchase Money Security Interst in Collateral
Priority in Purchase Money Security Interst in Collateral
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Introduction to Machine Learning Tasks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to give an overview of machine learning tasks. This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Governance, Management, Standards, and Frameworks
This video focuses on governance, management, standards, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
The Wall Street Journal
The Weakest (Supply Chain) Link
A company's security is only as good as that of its partners that have access to its critical systems. Take a look at how to manage the risks. Plus, examine how to strike the right balance between security and access.
The Wall Street Journal
How to Buy Cyber Insurance
In recent months, purchases of cybersecurity insurance have faced soaring premiums and more exclusions to coverage. Robert Parisi, cyber leader at Munich Re, leads this interactive workshop on making a purchase and how to arrive at the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...