The Business Professor
How does a Security Interest Benefit a Mortgage Lender
How does a Security Interest Benefit a Mortgage Lender
The Wall Street Journal
Technology Transformation at JPMorgan Chase
JPMorgan Chase & Co. Global CIO, Lori Beer, discusses the bank's plan to invest $14 billion on technology, digitization, infrastructure modernization, software development and to enhance its AI models, among other projects.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
The Wall Street Journal
Scoring Board
Successful chief information security officers are effective at getting their message across to the board. In this session we'll put two CISOs to the test as they present in front of two board members and have their efforts critiqued.
The Wall Street Journal
Kevin Mandia on the key lessons learned from SolarWinds
Kevin Mandia, CEO of FireEye, discusses the SolarWinds attack and what we can learn to provide better protection in the future.
Curated Video
Guiding Principle - Privacy and Security
In this video, we will cover a guiding principle - privacy and security. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Ask Me Anything (AMA)
Secure Sockets Layer (SSL) has long been used to secure network communication on LANs and WANs. This episode discusses how Transport Layer Security (TLS) supersedes SSL in addition to continued backwards-compatibility support that...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file. This clip is from the chapter "Dealing...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Values, Vision, Mission, and Plans
This video focuses on values, vision, mission, and plans. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Revision 4
This video explains NIST SP 800-53 revision 4. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Let's Tute
Consignment Accounting: Advanced Concept of Consignee's Security Money
In this video, the teacher explains the concept of advanced money from the consignee as security money in consignment accounting. They provide an example and show how the treatment of the advanced money differs depending on whether it is...
The Wall Street Journal
Defending America From Cyberattacks
CISA's executive director, Brandon Wales discusses the role of the agency in reinforcing America’s infrastructure security in light of continued geopolitical instability.
APMonitor
Introduction to OT Cybersecurity
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
The Wall Street Journal
Pro Perspective: Where Cybersecurity Meets Physical Security
Physical security can be an important part of cybersecurity, from controlling building access to protecting the residences of key employees. CISO of Global Guardian, outlines how companies can address both areas to create stronger...
The Wall Street Journal
Countering Digital Risk
Dick Clarke, former White House special advisor on cyberspace, on the accelerated efforts of cyber criminals. From ransomware attacks and supply chain compromises, to how continued state sponsored hacking means digital risk is greater...
National Institute of Standards and Technology
Password Security Fatigue
Ever get tired of having to update your username and password? In this video, Mary Theofanos explains the idea of security fatigue and how users are bogged down by too many decisions involving their online security. Creating awareness...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2
CISM Domain 1: Information Security Governance: Software development methodologies part 2 This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
National Institute of Standards and Technology
Vint Cerf: The past, present and future of the internet
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Touring the CLI
The Command-Line Interface (CLI) allows technicians to interact with Windows, Linux, and MacOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, MacOS uses a terminal shell, and Linux can use a...
Seven Dimensions
Principles and Protocols for Protecting Personal Items and Preventing Theft
Colin McLaren and Eve Ash discuss what people should do to protect their personal property and company assets. The video highlights the need for vigilance and proactive management in maintaining a safe work environment.