GISPP ACADEMY
GISPP ACADEMY
  • Видео 208
  • Просмотров 461 072
AI Ethical dilemmas | AI Ethics | What are AI Ethics
The speaker discusses artificial intelligence (AI) and its dilemmas in this session. He also discusses fairness, ethics, and ethical principles. The session also focuses on the problems with AI and their effects. The speaker also discusses the life cycle of an AI system and its reliability. A serious concern is also brought up about how employees of a company that uses AI for their daily tasks may be exposing company data to the internet. GRC is also discussed as a way to address issues that arise from employees of a company abusing AI.
Video has been divided into chapters for your convenience .
00:00 - 02:00 Sneak peek into the video
02:01 - 06:44 Introduction of the Speaker and Agenda
06:4...
Просмотров: 99

Видео

GDPR In Urdu | GDPR Urdu Video Lecture 7 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 7614 дней назад
This is 7th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 71 - article 85. Rest will be covered in future session which will be the last session . Video has been divided into chapters for your convenience . 00:00 - 01:59 Sneak Peek into the video 02:00 - 04:35 Speaker Introduction, Recap...
GDPR In Urdu | GDPR Urdu Video Lecture 6 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 8021 день назад
This is 6th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 62 - article 70. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 02:00 Sneak Peek into the video 02:01 - 05:15 Speaker Introduction, Recap and Upcoming Sessions Announc...
GDPR In Urdu | GDPR Urdu Video Lecture 5 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 5121 день назад
This is 5th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 56 - article 61. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 02:00 Sneak Peek into the video 02:01 - 05:15 Speaker Introduction, Recap and Upcoming Sessions Announc...
CISM Exam Overview | What is CISM | CISM Exam Preparation
Просмотров 22128 дней назад
In this Session the Speaker provides a brief overview about CISM Exam Overview .This is one of the most popular certification of ISACA .ISACA stands for the Information Systems Audit and Control Association .Some of their popular certification programs are CISA (Certified Information Systems Auditor ) ,CRISC (Certified in Risk and Information Systems Control) and CISM (Certified Information Sec...
What is ISACA certification | ISACA Certifications Overview | ISACA Certificates
Просмотров 39528 дней назад
In this Session the Speaker provides a brief overview about ISACA Certificates and Certification Programs . ISACA Stands for the Information Systems Audit and Control Association .Some of their popular certification programs are CISA (Certified Information Systems Auditor ) ,CRISC (Certified in Risk and Information Systems Control) and CISM (Certified Information Security Manager). They also pr...
Qatar Cybersecurity Landscape | Jobs in Qatar | Business in Qatar
Просмотров 480Месяц назад
This session explores Qatar's cybersecurity landscape in depth. It provides essential insights into current threats, regulations, and opportunities within Qatar's vibrant digital sphere. During this session, the speaker discussed Qatar's professional and business environment, highlighting how various key players operate within the local market. The intended audience for this session includes cy...
GDPR In Urdu | GDPR Urdu Video Lecture 4 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 117Месяц назад
This is 4th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 46 - article 55. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 01:27 Sneak Peek into the video 01:28 - 04:29 Speaker Introduction, Recap and Upcoming Sessions Announc...
GDPR In Urdu | GDPR Urdu Video Lectures 3 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 78Месяц назад
This is 3rd Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 35 - article 45. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 02:07 Sneak Peek into the video 02:08 - 04:47 Speaker Introduction, Recap and Upcoming Sessions Announc...
GDPR In Urdu | GDPR Urdu Video Lectures Part 2 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 188Месяц назад
This is Second Lecture of our GDPR in Urdu Series . In this session , the Speaker talks about different Articles of GDPR Law . Due to the high number of articles ,we have only covered 34 articles in this lecture . Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 03:01 Sneak Peek into the video 03:02 - 06:33 Speaker Introduction, Recap...
GDPR In Urdu | GDPR Urdu Video Lectures Part 1 | GDPR Seekhein Urdu mein | Learn GDPR in Urdu
Просмотров 503Месяц назад
This is first Lecture of our GDPR in Urdu Series . In this session , the Speaker talks about European Data Protection ,its History, Key Institutions and Key Terminologies used in GDPR .If you want to learn GDPR than this session is a must in order to build a good foundation and to familiarize yourself with GDPR related terms . Video is divided into chapters for your convenience . 00:00 - 02:57 ...
NCA ECC 2024 | NCA ECC Overview | NCA ECC Comparison
Просмотров 344Месяц назад
This Session provides you a brief Overview of NCC ECC Framework where ECC Stands for Essential Cybersecurity Controls and NCA is Saudi Arabia's National Cybersecurity Authority. The Presenter compares the latest ECC-2:2024 version to the Older ECC-1:2018 Version . Knowledge of this document is very important if someone is planning to land a job in Saudi Arabia Market .Language of session is Urd...
What is SAMA CSF | SAMA CSF Overview | What is SAMA Cyber Security Framework
Просмотров 425Месяц назад
This Session is an overview of SAMA Cybersecurity Framework .Video has been divided into chapters for your convenience . 00:00 - 03:00 Sneak peek into the video 03:01 - 04:33 Session Agenda (What will be covered) 04:34 - 05:14 What is SAMA and what is its Role and Purpose 05:15 - 07:59 What is SAMA CSF (Cyber Security Framework),Its Scope and history 08:00 - 08:36 SAMA Framework Superseded Circ...
US Immigration Visa information | Visa Options for US Immigration | Immigration Visas for USA
Просмотров 388Месяц назад
This session provides an overview of Immigration Options for USA that are most commonly used . Session has been done by an inforamtion security professional who has shared the information from his personal experience. Video has been diveded into chapters . 00:00 - 03:00 - Sneak peek into the video 03:01 - 07:47 - Session Agenda and Intro 07:48 - 09:25 - Types of Immigrant Visas 09:26 - 22:57 - ...
OT Security Workshop | OT Security Lab | OT Security Practice Lab
Просмотров 4512 месяца назад
OT Security Workshop | OT Security Lab | OT Security Practice Lab
OT Risk Assessment | OT Security Risk Assessment | Operational Technology Risk Assessment
Просмотров 3372 месяца назад
OT Risk Assessment | OT Security Risk Assessment | Operational Technology Risk Assessment
Job Hunting in Middle East | Job Hunting in Saudi Arabia | Job Hunting Tips and Tricks
Просмотров 1,6 тыс.2 месяца назад
Job Hunting in Middle East | Job Hunting in Saudi Arabia | Job Hunting Tips and Tricks
AI Adoption Framework | What is Artificial Intelligence | What is AI | AI Adoption Strategies
Просмотров 3022 месяца назад
AI Adoption Framework | What is Artificial Intelligence | What is AI | AI Adoption Strategies
What is OT Security Part 6 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 1462 месяца назад
What is OT Security Part 6 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 5 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 1882 месяца назад
What is OT Security Part 5 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 4 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 2432 месяца назад
What is OT Security Part 4 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 3 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 2672 месяца назад
What is OT Security Part 3 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 2 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 3922 месяца назад
What is OT Security Part 2 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 1| Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 1,2 тыс.3 месяца назад
What is OT Security Part 1| Industrial Control Systems Basics | Industrial Control Systems Concepts
What is Quantum Technology | What is Quantum Computing
Просмотров 3283 месяца назад
What is Quantum Technology | What is Quantum Computing
What is SOC2 | SOC2 Compliance and Certification
Просмотров 7363 месяца назад
What is SOC2 | SOC2 Compliance and Certification
AMSI bypass for beginners | AMSI bypass statically via debugger
Просмотров 3189 месяцев назад
AMSI bypass for beginners | AMSI bypass statically via debugger
GISPP Members Annual Forum 2023 Media Coverage
Просмотров 69Год назад
GISPP Members Annual Forum 2023 Media Coverage
IT Professionals Networking Event | Professional Diaspora Networking Dinner
Просмотров 212Год назад
IT Professionals Networking Event | Professional Diaspora Networking Dinner
What is OWASP Top 10 | How to Prevent against OWASP Top 10 Risks | Strengthening Web Applications
Просмотров 1,3 тыс.Год назад
What is OWASP Top 10 | How to Prevent against OWASP Top 10 Risks | Strengthening Web Applications

Комментарии

  • @Mr.Pakistani2023
    @Mr.Pakistani2023 5 дней назад

    Superb 🎉

  • @arsalananwar8265
    @arsalananwar8265 6 дней назад

    Good

  • @salukhan3494
    @salukhan3494 7 дней назад

    Love the way you are guiding us

    • @GISPPACADEMY
      @GISPPACADEMY 7 дней назад

      Thanks for your valuable feedback.

  • @shahzadsubhani2483
    @shahzadsubhani2483 12 дней назад

    Amazing insights indeed

  • @MuhammadKashif-qy4ht
    @MuhammadKashif-qy4ht 16 дней назад

    Excellent Explanation .....First one to comment :)

    • @GISPPACADEMY
      @GISPPACADEMY 13 дней назад

      Thanks for your valuable feedback

  • @shahzadsubhani2483
    @shahzadsubhani2483 16 дней назад

    Amazing efforts indeed by the speaker

  • @computerstudy9247
    @computerstudy9247 18 дней назад

    Very helpful Could you please create a detailed video on NIA and QCSF if possible?

  • @ahmedafb
    @ahmedafb 20 дней назад

    someone trying to take control of my screen. Intruder tried to hack your session 😅

  • @nadeemrv
    @nadeemrv 22 дня назад

    Good session, I have a question: Is SAMA is exclusive from PCI-DSS? I mean If a company is fully compliant by SAMA then is there no need for PCI-DSS in KSA?

    • @GISPPACADEMY
      @GISPPACADEMY 22 дня назад

      It does not work that way. PCI DSS is an international standard for protecting credit cards data so it is applicable if a company deals with credit cards.

  • @ian230187
    @ian230187 25 дней назад

    Loved this...Thanks a lot

  • @londoninseconds
    @londoninseconds 28 дней назад

    Are you going to teach complete course ?

    • @GISPPACADEMY
      @GISPPACADEMY 27 дней назад

      We are considering this but it depends on trainer's availability.

  • @tobateksingh4933
    @tobateksingh4933 29 дней назад

    Start online course with real labs and internship. Only videos is not sufficient.

    • @GISPPACADEMY
      @GISPPACADEMY 29 дней назад

      Labs are not required for ISACA Certifications.

  • @alidayani4196
    @alidayani4196 29 дней назад

    Do prefer proceeding for CRSIC after CISSP?

    • @GISPPACADEMY
      @GISPPACADEMY 29 дней назад

      It really depends on your career goals and interests. CRISC is more about Risk management and it certainly adds value to your profile.

  • @ahmadjavaid1529
    @ahmadjavaid1529 Месяц назад

    Thoroughly enjoyed this insightful discussion....

  • @voicefthd4248
    @voicefthd4248 Месяц назад

    Thank you for sharing the insights, it is helpful!

  • @arsalananwar8265
    @arsalananwar8265 Месяц назад

    Very informative video

  • @nadeemrv
    @nadeemrv Месяц назад

    Very informative sessions, much appreciated.

  • @londoninseconds
    @londoninseconds Месяц назад

    Thank you

  • @arsalananwar8265
    @arsalananwar8265 Месяц назад

    Very helpful

  • @arsalananwar8265
    @arsalananwar8265 Месяц назад

    Sir Very helpful training

  • @arsalananwar8265
    @arsalananwar8265 Месяц назад

    Very informative session Sir

    • @GISPPACADEMY
      @GISPPACADEMY Месяц назад

      Thanks for your valuable feedback

  • @asimmuneer1010
    @asimmuneer1010 Месяц назад

    All nurses getting EB2 visa from Pakistan.

  • @lawalopeyemiridwan8191
    @lawalopeyemiridwan8191 Месяц назад

    Awesome

  • @adilsohail5555
    @adilsohail5555 Месяц назад

    Gr8 job

    • @GISPPACADEMY
      @GISPPACADEMY Месяц назад

      Thanks for your valuable feedback

  • @Cybrites
    @Cybrites 2 месяца назад

    Appreciate the effort put behind these sessions.

  • @waqasrafaqat5932
    @waqasrafaqat5932 2 месяца назад

    It was indeed a very informative session! Mr. Sohail explained it very well and believe me these are the key points that most of us miss or are unaware of.

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      Thank you for your kind words and support.

  • @zamirmushtaq9244
    @zamirmushtaq9244 2 месяца назад

    Very helpful session. Jazak Allah sir

  • @sarimscorner956
    @sarimscorner956 2 месяца назад

    Appreciate your efforts @Sohail bhai and Shehzad bhai

  • @ehsan719
    @ehsan719 2 месяца назад

    Great, helpful video, thanks.

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      @@ehsan719 Thanks for the kind words

  • @nabeelrashid8981
    @nabeelrashid8981 2 месяца назад

    Great learning about AI concepts

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      Thanks for your kind words and support

  • @Mind_Set_Building
    @Mind_Set_Building 2 месяца назад

    Very interactive and to the point.

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      @@Mind_Set_Building Thanks for your feedback.

  • @zeroxinn3863
    @zeroxinn3863 2 месяца назад

    good job done

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      Thanks for your valuable feedback

  • @ian230187
    @ian230187 2 месяца назад

    Any specific reason in 26:10 for keeping the data historian in IT network?

    • @amir123able
      @amir123able 2 месяца назад

      It's one of the implementation, and I have specified the reason, as historian are now SQL Servers, which can have vulnerability inside them, which may cause threats to OT environment

    • @amir123able
      @amir123able 2 месяца назад

      We can keep data historians in DMZ, in OT network, or in IT network.. depending upon how we evaluate its placement commensurate with risks in our infrastructure

    • @ian230187
      @ian230187 2 месяца назад

      @@amir123able thanks Amir... learning a lot from these videos

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      That's the idea behind. If you see our channel, we have many videos on different cybersecurity related topics.

  • @ian230187
    @ian230187 2 месяца назад

    ISA-95 architecture: Just out of curiosity why isnt the term PURDUE MODEL being used here?

    • @amir123able
      @amir123able 2 месяца назад

      Purdue model has been referred while explaining ISA 95 architecture, and I would request you to kindly view the complete lectures

    • @ian230187
      @ian230187 2 месяца назад

      @@amir123able thanks Amir...i am on video 2...guess in the later videos it comes in

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      I strongly suggest you to watch all the videos. It was a 3 hours session so we divided it into 6 parts. You can Look at the chapters to get an idea of what is covered.

  • @ian230187
    @ian230187 2 месяца назад

    Beautiful explanation

  • @TheFalconi
    @TheFalconi 2 месяца назад

    Solid start 👍

    • @GISPPACADEMY
      @GISPPACADEMY 2 месяца назад

      It is just a preview of what's covered in the session

  • @raheelshariff4124
    @raheelshariff4124 3 месяца назад

    Please upload videos in urdu language

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      We aim to make our content accessible to a broader audience. However we try to use very simple English that is easy to understand. You can check our channel for urdu videos as well. ruclips.net/p/PLgwj_y650-7dPGUfJspnLV-Kb6KhaWhHd&si=CzDaG-0kSxMECzsh

  • @arsalananwar8265
    @arsalananwar8265 3 месяца назад

    Very informative

  • @jahanzebferoze3063
    @jahanzebferoze3063 3 месяца назад

    Nice work as always by GISSP.

  • @sziahussain
    @sziahussain 3 месяца назад

    Thanks for your efforts but facing an issue if you help , the topic explanation is good but the topics are not aligned with the book, you should have mentioned topics like 5.6-Data Classification and 5.1-security framework, even topics are not in series as mentioned in the book and found some differences in terminology or keyword, the main issue is after watching this, I am unable to identify that how much domain have been covered, may be you have some other plan, but again appreciate your efforts .

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      It seems you're focused on the book's structure. This video covers key concepts in a way that emphasizes practical application. You can also reach out to the trainer via his LinkedIn profile for more clarification.

  • @mohsinhussain86
    @mohsinhussain86 3 месяца назад

    Thank you for the informative session Main audience is Pak Community then it should be in Urdu Language.

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      We appreciate the feedback, however, we try to make our content accessible to a broader audience. Btw some part of the Question Answers Session was in urdu.

  • @danishazizkhan6099
    @danishazizkhan6099 3 месяца назад

    This is really makes me curious

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      Thank you for your support

  • @Agha_Retrogaming
    @Agha_Retrogaming 3 месяца назад

    The presenter is talking amout Risk Assessment, although he dosent explain the process to how to do the Risk Assessment ? Who will be the stake holders you need to take. Hence, I think the preseter do not aware about the complete process of risk assessment of OT.

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      Risk Assessment is a detailed topic. You can watch this to know more about it. ruclips.net/video/NDUB418wLy0/видео.html

    • @Agha_Retrogaming
      @Agha_Retrogaming 3 месяца назад

      @@GISPPACADEMY Thank you for sharing the Risk Assessment video. However, my question is in scope of the video which is more focused on OT/IoT architecture. In my opinion, the presenter do not respond to a question for Risk Assessment in OT environment. For example, who will do the Risk Assessment ? Do the Risk Assessment team need to take onboard other stake holders or not, etc.

  • @arsalananwar8265
    @arsalananwar8265 3 месяца назад

    Very informative session

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      Glad you found it helpful!

  • @اشرفالقايدي
    @اشرفالقايدي 3 месяца назад

    why we don't have blackhat in africa(tunisia, algeria...etc)

    • @GISPPACADEMY
      @GISPPACADEMY 3 месяца назад

      I think that it is due to security risks. If you want to invite people from all over the world, you want a very secure environment.

  • @harisanwar8794
    @harisanwar8794 4 месяца назад

    nice. hard to come by nice and precise videos on the advanced subject

  • @Raj-z3h2r
    @Raj-z3h2r 5 месяцев назад

    Love from India dude ❤😂

  • @ufcblogs7121
    @ufcblogs7121 5 месяцев назад

    Please confirm that for certification can we rely only your's video

    • @GISPPACADEMY
      @GISPPACADEMY 5 месяцев назад

      That will definitely not be enough. You need to read CISA Manual and do practice exams as well.

    • @ufcblogs7121
      @ufcblogs7121 5 месяцев назад

      @@GISPPACADEMY Thank You

  • @julius64
    @julius64 6 месяцев назад

    1:48. Worst half baked from crowd. Presenter s very patient.

    • @GISPPACADEMY
      @GISPPACADEMY 5 месяцев назад

      These were zoom sessions which were recorded and uploaded later.

  • @AimLessMunda
    @AimLessMunda 6 месяцев назад

    nice job ❤keep it up🎉 dear best citizen of Pakistan