Kyber Security
Kyber Security
  • Видео 106
  • Просмотров 122 598

Видео

Is Anyone Going To Steal My Data?
Просмотров 421 день назад
Is Anyone Going To Steal My Data?
What Are The Top Challenges To Becoming CMMC Compliant?
Просмотров 321 день назад
What Are The Top Challenges To Becoming CMMC Compliant?
What Happens When a Server Fails?
Просмотров 221 день назад
What Happens When a Server Fails?
Is It Ok To Save Passwords In A Browser?
Просмотров 321 день назад
Is It Ok To Save Passwords In A Browser?
How Long Does It Take To Become CMMC Compliant?
Просмотров 821 день назад
How Long Does It Take To Become CMMC Compliant?
How Much Does It Cost To Be CMMC Compliant?
Просмотров 1421 день назад
How Much Does It Cost To Be CMMC Compliant?
What Does the Gap Assessment Process Look Like?
Просмотров 121 день назад
What Does the Gap Assessment Process Look Like?
What is CMMC?
Просмотров 221 день назад
What is CMMC?
How Can I Afford To Become CMMC Compliant?
Просмотров 321 день назад
How Can I Afford To Become CMMC Compliant?
Do I Need To Back Up My Cloud Data?
Просмотров 321 день назад
Do I Need To Back Up My Cloud Data?
What is Vulnerability Scanning?
Просмотров 821 день назад
What is Vulnerability Scanning?
What is a SSP?
Просмотров 121 день назад
What is a SSP?
What is a POAM?
Просмотров 421 день назад
What is a POAM?
What If I Do Not Comply With CMMC?
Просмотров 321 день назад
What If I Do Not Comply With CMMC?
What is FCI and CUI?
Просмотров 521 день назад
What is FCI and CUI?
Does My MSP Already Take Care of Cybersecurity?
Просмотров 52 месяца назад
Does My MSP Already Take Care of Cybersecurity?
How Can Reputation Damage Affect An Organization?
Просмотров 62 месяца назад
How Can Reputation Damage Affect An Organization?
Can an MSSP Handle Day-to-Day Issues?
Просмотров 122 месяца назад
Can an MSSP Handle Day-to-Day Issues?
What is a Master Services Agreement (MSA)?
Просмотров 422 месяца назад
What is a Master Services Agreement (MSA)?
What is Defense in Depth?
Просмотров 42 месяца назад
What is Defense in Depth?
What is Cybersecurity?
Просмотров 102 месяца назад
What is Cybersecurity?
What is the NIST Cybersecurity Framework?
Просмотров 102 месяца назад
What is the NIST Cybersecurity Framework?
What Things Should I Prepare Before Making An MSP Change?
Просмотров 42 месяца назад
What Things Should I Prepare Before Making An MSP Change?
Why Is Cyber Awareness Training Important?
Просмотров 32 месяца назад
Why Is Cyber Awareness Training Important?
How Much Does It Cost to Secure My Company?
Просмотров 132 месяца назад
How Much Does It Cost to Secure My Company?
Is CMMC Important For My Organization
Просмотров 195 месяцев назад
Is CMMC Important For My Organization
How Long Does It Take To Become CMMC Compliant?
Просмотров 175 месяцев назад
How Long Does It Take To Become CMMC Compliant?
Does My Organization Need to Be CMMC Compliant?
Просмотров 135 месяцев назад
Does My Organization Need to Be CMMC Compliant?
What is SOC Monitoring?
Просмотров 295 месяцев назад
What is SOC Monitoring?

Комментарии

  • @jann9507
    @jann9507 3 месяца назад

    Disjointed talk…. Wasn’t clear on the objective nor the solution

  • @brandonchoquette691
    @brandonchoquette691 7 месяцев назад

    Great information! Thanks as always Michael and Bob :)

  • @thaliagerardo3477
    @thaliagerardo3477 10 месяцев назад

    Promo-SM 😒

  • @kentrelc1
    @kentrelc1 11 месяцев назад

    Great presentation !

  • @user-cn8ps6pm5s
    @user-cn8ps6pm5s Год назад

    THANK YOOUUUU

    • @KyberSecurity
      @KyberSecurity 9 месяцев назад

      You're welcome, glad this helped!

  • @ThunderGreens
    @ThunderGreens Год назад

    This really helps

  • @jii8271
    @jii8271 Год назад

    Promo*SM

  • @devspice
    @devspice Год назад

    Excellent presentation.

  • @bigqdone
    @bigqdone Год назад

    Awesome summary thanks!

  • @DelandaBaudLacanian
    @DelandaBaudLacanian Год назад

    What is a good certificate for a lowly programmer to get to get into cybersecurity?

  • @nash1072
    @nash1072 Год назад

    🔥 PЯӨMӨƧM

  • @TechViking
    @TechViking Год назад

    Do you have any tricks to lock Idenfity Protect detect respond recover to memory

  • @humoroustumorous6642
    @humoroustumorous6642 Год назад

    Thank you so much for this video. I’m just getting into GRC and trying to learn as much as I can. This was very enlightening.

  • @apstech4618
    @apstech4618 Год назад

    If the Navy owns a submarine, and they put it in drydock, they pay the dockmaster the rent. Or they own the dock outright. Right? When the Air Force stores a jet fighter, they pay rent, or they buy the hangar. Right? In no-case does the Navy or Air Force ever tell the property owner, "give us the storage and security for free, and pay all your own associated costs, and maybe we'll give you a contract in the future if you do" Right? To be perfectly clear: The DOD OWNS their own CUI. To then try to push both the responsibility and costs on storage and handling to third parties (Primes and Subs), while expecting their "landlords" to eat the costs upon a promise of a potential contract later, is just not workable. If the Federal Government wants to carry out its "Constitutionally Mandated obligations to secure the Nation", then it must understand that fact that it owns the CUI, and it dictates the controls and storage of CUI, and then it will pay to have those controls and storage implemented for It's CUI. None of the CMMC Regulation for Accountability makes any sense because the DOD is obviously trying to offload National Security back onto the people they are taxing and tasked with securing. The CMMC boondoggle IS the equivalent of telling companies to hire their own consultants to figure out ways to defend their airspace with homemade anti-aircraft missiles. National defense IS the sole province of the Federal Government. It cannot be shrugged-off back onto the people the government is supposed to be defending. It's obvious that The DOD wants to do cybersecurity on the cheap and line their pockets and their nepotist-crony's coffers, so it can keep awarding huge contracts to legacy defense contractors, who are their big political donors (PACs). Anyone who doesn't see this is a fool. Anyone who won't admit it is an accessory. Critical Thinkers will prevail, but don't expect the little guys to eat these costs. The Costs for this will be baked into everything you submit a PO for -or- DiB Subs will just stop doing business with the Federal Government. Round and Round... Back to the drawing board.

  • @pandaicrtani667
    @pandaicrtani667 Год назад

    huzhu

  • @pandaicrtani667
    @pandaicrtani667 Год назад

    eh

  • @zuowang5481
    @zuowang5481 Год назад

    Isn't this NIST framework just an empty talk/common sense?

  • @beansprout_apg886
    @beansprout_apg886 2 года назад

    Thank you so much.

  • @jackieo7113
    @jackieo7113 2 года назад

    Hello - this was quite informative - are you able to post the entire session?

  • @cyberprofessional9834
    @cyberprofessional9834 2 года назад

    great presentation

  • @johnsonroy7233
    @johnsonroy7233 2 года назад

    Can you please show how to crack or bypass Think-Cell software license key

  • @jaikisan3393
    @jaikisan3393 3 года назад

    Super.. Every thing summed up nicely for quick learning

    • @KyberSecurity
      @KyberSecurity 3 года назад

      Thank you. We appreciate the kind words!

  • @digitalinnovationtechs8
    @digitalinnovationtechs8 3 года назад

    Thanks. Your video was very explainful!

  • @sousosisi316
    @sousosisi316 3 года назад

    Work net detect identity key security energical connect web from pc

  • @ITHunt-
    @ITHunt- 3 года назад

    Nice course thank you

  • @rithwiks
    @rithwiks 3 года назад

    Very Nice. Wish you to catch up with the presenter

  • @niral.shakya
    @niral.shakya 3 года назад

    Genius.. Explained the 5 function the simple and best way...

  • @TanujPandey18
    @TanujPandey18 3 года назад

    Simple and easy to grasp!

  • @johnwood9375
    @johnwood9375 3 года назад

    Empirestore11 on Telegram is the right plug for your cc and dumps.. I just got my valid and working cc from him.... He's good and trustworthy ❤️✅

  • @watchmine5531
    @watchmine5531 3 года назад

    There might be fake ones out there but real one do exist contact @Darknills on *telegram* he is the real vendor, I got my cc with high balance from him yesterday 🙏

  • @rumildaolik4905
    @rumildaolik4905 3 года назад

    thanks

  • @ifeanyiok8916
    @ifeanyiok8916 4 года назад

    Great summary. Thank you

  • @TheOrlowskiObjective
    @TheOrlowskiObjective 4 года назад

    The problem is that this nonsense hour is too long to bring any validation to a process, that is a psy ops reality gone wild. Not a psychological but psychotic operational clusterfuck. Do I have to sing to the choir? A GooTube random algorithm generating, artificial intelligence? military sand box that needs cleaning, replacing..upgrading? 2 years..2 months..2 days..2 hours..2 min. 2 sec..2 anything before...the gap..bitch. More like the 12 year media time loop. 1963.. Camelot's last virtual staff ride... and 1975..Geraldo..I will work in front of a green screen forever and never know it, 'America Tonight' the Zapruder film gets shown publicly for the first time. Then becomes the standard looped video proof..of the event? Nancy Pelosi says for the cameras, we must pass Obama Care in order to be able to read it." Both 12 year time loops need patching before the kids...go out to play. If I have to do it all myself...oh please let me...as if I need help or permission... ....12 hours from this time stamp..proof of profanity and less...will be moar.~

  • @TheOrlowskiObjective
    @TheOrlowskiObjective 4 года назад

    If the dark web did not exist it would have to be invented. The same way you would allow me to sell you a $5 pillow for $85.

  • @macshild
    @macshild 4 года назад

    IF you follow the NIST Framework to the letter, will that severely reduce gap towards GDPR and HIPAA and compliance?