- Видео 528
- Просмотров 83 289
Archer
США
Добавлен 17 янв 2016
Defending your mission-critical operation against today’s multi-dimensional threats requires focus, expertise, and strategic vision. Let Archer’s team of experienced industry professionals help you understand, define, communicate and leverage your risk environment to strengthen your business.
We produce weekly videos revolving around: #criticalinfrastructure #cybersecurity #physicalsecurity #audit #compliance #ferc #nerc #education #awareness
Contact Archer:
www.archerint.com
1 800 805 7411
contact@archerint.com
We produce weekly videos revolving around: #criticalinfrastructure #cybersecurity #physicalsecurity #audit #compliance #ferc #nerc #education #awareness
Contact Archer:
www.archerint.com
1 800 805 7411
contact@archerint.com
The World of Surveillance Operations
In this episode of DirectConnect, Nick Weber, Managing Partner at Archer, dives deep into Surveillance Operations with Carlos Francisco, Sandra Stibbards and Scot Walker.
Would just like to learn more about Archer Energy Solutions and what we do? Head over to our website @ www.archerint.com, give us a call @ 1-800-805-7411 or email us @ contact@archerint.com, we’d love to hear from you!
#Surveillance #Undercover #ArcherEnergySolutions #CriticalInfrastructure #PhysicalSecurity #Podcast #Cybersecurity #Compliance #FERC #NERC #CIPStandards #FiresideChat #Fortune500
Would just like to learn more about Archer Energy Solutions and what we do? Head over to our website @ www.archerint.com, give us a call @ 1-800-805-7411 or email us @ contact@archerint.com, we’d love to hear from you!
#Surveillance #Undercover #ArcherEnergySolutions #CriticalInfrastructure #PhysicalSecurity #Podcast #Cybersecurity #Compliance #FERC #NERC #CIPStandards #FiresideChat #Fortune500
Просмотров: 17
Видео
#FERC / Lessons Learned Report
Просмотров 99 часов назад
On this episode of On Target, Steve Parker, Managing Partner at Archer, talks about the Lessons Learned from the Commission-Led CIP Reliability Audits. Link to the Report: ferc.gov/sites/default/files/2024-08/24_Lessons Learned_0826.pdf Welcome to On Target with Archer, a weekly video series where we answer an important question or discuss a hot topic, from the serious to the not so serious. Tu...
Mastering the NERC Compliance Requirements
Просмотров 38День назад
On this episode of On Target, Stacy Bresler, Managing Partner at Archer, dives into the importance of understanding NERC compliance requirements beyond the usual audit practices. Stacey highlights the need for role-based, comprehensive training and urges organizations to continually mature their programs, rather than just meeting the minimum standards. Tune in to learn how to better prepare for...
Lowering Risk Via Automation - Guest Austin Rappeport
Просмотров 4514 дней назад
In this episode of DirectConnect, Leonard Chamberlin, Managing Partner at Archer, sits down with Austin Rappeport to talk about how we can lower risk through the use of automation. Would just like to learn more about Archer Energy Solutions and what we do? Head over to our website @ www.archerint.com, give us a call @ 1-800-805-7411 or email us @ contact@archerint.com, we’d love to hear from yo...
Advice if You're New to Compliance Management
Просмотров 3614 дней назад
On this episode of On Target, Nick Weber, Managing Partner at Archer, gives a little advice to the Compliance Managers that may just be starting out or were thrust into the role. Welcome to On Target with Archer, a weekly video series where we answer an important question or discuss a hot topic, from the serious to the not so serious. Tune in every Monday for a new video and let us know in the ...
How Can I Secure My Cloud-Based Data and Applications? - Ask Archer
Просмотров 4021 день назад
How can I secure my cloud-based data and applications? ☁️ Ask Archer: Securing Your Cloud-Based Data and Applications ☁️ Concerned about the security of your cloud-based data and applications? Archer’s here with essential tips, to keep your cloud environment safe! 🔒 1. Use Strong Authentication: Implement multi-factor authentication to ensure that only authorized users can access your cloud res...
Make Sure to Have Fun!
Просмотров 3721 день назад
On this episode of On Target, Stacy Bresler, Managing Partner at Archer, pauses for a moment to remind us that we do hard work and to stop what you’re doing and have some fun, otherwise we burn out. Welcome to On Target with Archer, a weekly video series where we answer an important question or discuss a hot topic, from the serious to the not so serious. Tune in every Monday for a new video and...
What is Endpoint Security? - Ask Archer
Просмотров 5328 дней назад
🔐 Ask Archer: Understanding Endpoint Security 🔐 Ever heard of endpoint security but not sure what it means or why it’s important? Archer’s here to shed some light! 💻 What is Endpoint Security?: Endpoint security involves protecting all endpoints-such as laptops, smartphones, tablets, and other devices-that connect to your network. It includes measures like antivirus software, firewalls, intrusi...
What are The Kindness Games? #thekindnessgames
Просмотров 8428 дней назад
What are The Kindness Games? #thekindnessgames
The Difference Between a Program and a Plan #NERC #FERC
Просмотров 40Месяц назад
The Difference Between a Program and a Plan #NERC #FERC
How do I identify and Prioritize Risks Within my Organization? - Ask Archer
Просмотров 48Месяц назад
How do I identify and Prioritize Risks Within my Organization? - Ask Archer
The "Not So Simple" CIP Standards #NERC #cipstandards
Просмотров 69Месяц назад
The "Not So Simple" CIP Standards #NERC #cipstandards
What are the Eleven Critical Infrastructure Sectors? - Ask Archer
Просмотров 88Месяц назад
What are the Eleven Critical Infrastructure Sectors? - Ask Archer
SBOM: Software Bill of Materials - Guest Chris Blask
Просмотров 72Месяц назад
SBOM: Software Bill of Materials - Guest Chris Blask
Essential Reliability Services - MRO’s Number Eight Regional Risk
Просмотров 53Месяц назад
Essential Reliability Services - MRO’s Number Eight Regional Risk
What are the Biggest Cyber Attacks on Critical Infrastructure? - Ask Archer
Просмотров 95Месяц назад
What are the Biggest Cyber Attacks on Critical Infrastructure? - Ask Archer
Cybersecurity 101: Cyber Forensics Like CSI Miami!
Просмотров 84Месяц назад
Cybersecurity 101: Cyber Forensics Like CSI Miami!
IBR and DER Performance - MRO’s Number Four Regional Risk
Просмотров 62Месяц назад
IBR and DER Performance - MRO’s Number Four Regional Risk
What is Risk Assessment and Why is it Important? - Ask Archer
Просмотров 83Месяц назад
What is Risk Assessment and Why is it Important? - Ask Archer
Equipment Unavailability - MRO’s Number Five Regional Risk
Просмотров 69Месяц назад
Equipment Unavailability - MRO’s Number Five Regional Risk
Why is Protecting Critical Infrastructure Important? - Ask Archer
Просмотров 1112 месяца назад
Why is Protecting Critical Infrastructure Important? - Ask Archer
Malicious Insider Threat - MRO’s Number Seven Regional Risk
Просмотров 742 месяца назад
Malicious Insider Threat - MRO’s Number Seven Regional Risk
Vulnerability VS Exploit - Ask Archer
Просмотров 1912 месяца назад
Vulnerability VS Exploit - Ask Archer
Cybersecurity 101: A closer look at Footprinting
Просмотров 5122 месяца назад
Cybersecurity 101: A closer look at Footprinting
NERC CIP Challenges - Guest Tim Starr
Просмотров 1342 месяца назад
NERC CIP Challenges - Guest Tim Starr
Extreme Cold Weather - MRO’s Number Two Regional Risk
Просмотров 1582 месяца назад
Extreme Cold Weather - MRO’s Number Two Regional Risk
Understanding Cyber Attacks - Ask Archer
Просмотров 1092 месяца назад
Understanding Cyber Attacks - Ask Archer
Thanks for having us on Nick and Archer! Carlos, Sandra, and I had a lot of fun!
@@ScotWalkersProtectiveFuture This episode turned out great! 😊
Suggestion for future topics in Cyber101: Zero Trust
“Name every sector of the economy except fashion, toys, tourism and entertainment”
Is there a topic you'd like to see us cover? Leave it in the comments!
Suggestion for future topics in Cybersecurity 101: SQL injection
@@bilalsaadaoui thank you!
Q: Are you running Windows 10/11? A: Your computer is compromised by at least 3 government agencies from around the world. Please remove and install Linux.
Go Blue Jays!!
Cyber attacks against businesses that choose centralized setups to store sensitive information are akin to inviting the cyber world to target them. Centralized systems present a single point of failure, making them more vulnerable to sophisticated cyber threats looking to exploit weaknesses for malicious purposes.
@@user-ol7tl1vf5m great point!!
You're a susy baka
Don’t forget to “like” and subscribe!
@@ArcherU Are you the one voicing the video or its AI?
@@baby_boss1234 it’s not AI.
Thank you for this beautiful video and explanation. You need more views!
Thank you!! 🙏🏼
Why did I just watch this video, as opposed to asking ChatGPT this crap myself?
Thanks for this!
It’s much like backdating legal documents or a check.
That’s a great way to put it!
❤❤😮😊😊
Do you have any other interesting information that Mark may have missed about Human-as-a-Service?
Do you have any good advice or tips when working remotely?
Love the ghost bot!!!
I like your videos they are unique
Thank you very much!!
As it turns out, hackers are always one step ahead of our security measures. For every security measure there is a hack. Both sides are evolving. Yesterday I watched Liron Segev demonstrating a $5000 malware leaking from a virtual machine into the PC. Figure that out! Quite recently we were a tiny step from having all servers and PCs in the world affected by XZ backdoor hack. They are after us. Your protective behaviour and equipment will last only as long as it hasn't met its match. Yet.
Exactly, as soon as you put out something, they can protect you. They figure out a way to get around it. The endless cycle.
You must be using a different bot because mine tends to give me lengthy paragraphs with explanations. I rarely see a one or two lines answers. And kudos to your health improvements. Use it or lose it - body, muscles, brain cells... walking alone is very beneficial for health and IT people hugely neglect it. To their detriment. PS: that sound effect in the background is disturbing my attention. Could it go without it next time? AI will be probably able to extract your voice anyway, or they can get it other ways if they wanted it. Like cold callers.
It’s all in how I set it up. Before I start, I ask it to keep the answers short. Because yes, the answers will be super long!
I like how you are using gpt to teach you and in turn teach others , these days ppl try the “get rich quick” scheme of having an ai generated voice over , keep learning and helping others with your content!
Thank you!! I’m just trying to learn this crazy stuff lol - thank you for your nice comment!
Fantastic Podcast! I like how you are approaching the subject of "Evolution" of physical security. We have been seeing a trend to throw more concrete at the problem. I really like how the three of you look at the challenges and apply practical solutions. Well done.
Hashing is a one way function that is used as a secure way to store passwords and other things. It is a one way function in that it cannot be reversed like encryption. Validating passwords using hashing functions is based on a principle known as the zero-knowledge proof. Meaning, hashing is so brilliant for password validation because you don't actually need to know the password in order to validate it. Since hashing a password is going to turn it into a string of characters unrecognizable from the original, you can hash the password the person puts when they log in, and compare it with the hashed password for that user in the database. I might've gotten something wrong, it's been a while since I've looked at hashing, so be sure to validate what I'm saying. Regardless, hope this helped!! :-)
You deserve more views great video btw
Thank you! We really enjoyed this one!
malware bytes is a good free one
In simplest terms, sandboxing just means "to isolate" essentially. For example, if you are analyzing malware - you want to do this in a "sandboxed environment" away from any other systems. To accomplish this, one might set up a Virtual Machine just for malware analysis and put it on an isolated Virtual LAN. This way, even if malware were to attempt to propagate itself through a network - it would have no where to go, in theory. There are many reasons you may want to set up a Sandbox.
Great explanation! Thank you! 🙏🏼
@@ArcherU Sure, an example of a defense use-case would be to isolate a web server from the rest of a local area network by setting up a sandbox. You want the web server to be connected to and accessible from the internet(it's hosting a website after all), but in case this web server were to become compromised somehow, you don't want it to be linked to your other devices in your home, lab, or domain. The risk here is the internet. Malicious users can access your website, they could find a vulnerability, and maybe exploit it to gain access to the web server or something like that. If this were to happen, you don't want the threat actor to then be able to move laterally through your network. You want to contain the threat, and stop the spread - this is what sandboxing accomplishes in this use-case. I'm sure you can think now of many other reasons you may want to 'set up a sandbox'.
Thank you for sharing such a detailed explanation! Your insights are really helpful in understanding the importance of sandboxing in cybersecurity.
So glad you guys enjoyed the WICF workshop and the breakouts!!
Heyaa, I came across your video, and its really well presented! . As someone promising youtubers guaranteed growth.. I believe there are strategies that could enhance your reach. Would you be open to discussing ideas over a quick call? No pressure, just aiming to share valuable insights.
Thank you for the videos you are sharing. 😊
Thank you for the nice comment! 👍🏻
I have 2 degrees in cybersecurity, its giving you a 10,000 foot view. There are many tools available such as forensics tools like e3 or autopsy, builtin tools like PStools or things like sysinternals that would allow you to actually find evidence of infection without relying on AV programs.
Wait man you just read it out of chat gpt??
At least he is being honest. Anyway.. we reached peak of human invention for sure :D ..
@@tetst_54546 agreed we have reached peak human invention, i don't know maybe its just me but i thought there will be some practical showcase of how things happen or how to prevent them but was met with a sad vibe while reading off chatgpt.
@@tetst_54546 agreed we have indeed reached peak human invention, i don't know maybe its just me but i thought there will be some practical showcase of how things happen and how to prevent it but was met with a sad vibe while reading out of chatgpt
naah mid as content
Yes, I agree.
I landed on your video and it's really good and editing is good as well, pls don't mind but I saw on your channel, you posted quite good number of videos and I can see the current reach is not that good. You can improve your reach by focusing collectively on thumbnails, specially in your niche improving SEO would be a deal breaker and the video editing. If you want to get it sorted then I would love to have a conversation..
My brother got a scam call today from "Amazon" asking to confirm his "order of $1500". He just told them "yep, that was me!". All he got back was "uh... okay" and then they hung up. I'm definitely going to try this the next chance I get.
Nice!!
It was Stacy's mom. (the pedophile)
Nice blur mark hemmingway
We have a saying at work: the CEO will never signed his text message with his name (who does that?) nor will ask you to buy him gift cards.
Why would anyone pretend to be your boss?
If the employee is trusted to handle money, a common followup is to ask them to pay a (fraudulent) bill. There was even a case a few weeks ago where someone used deepfakes to fake a bosses appearance on a Zoom call and ask for a money transfer.
To make you quickly pay a large important invoice or something like that.
I have my bosses number saved so i once had this and immediately called it said the same thing. next morning told my boss had a meeting. gave the number to HR and our cyber security division got the person arrested in 2 weeks
I could see myself getting this wrong and coming in to work the next day only to find out I'm canned
There was a moment that I was a little worried. But I know my boss isn’t that quick to fire people. At least not that I know of lol 😂
blurring doesn't work too well to stop info, just use a black box o/ Mr Hemmingway
These new millennial scams are interesting.
Phishing message scams has been a thing since the 1990s
I'm not talking about the when, I'm talking about the target. They know they can't get us like they do with the boomers and their gift cards.
Thanks! Also, they blocked me after I called their bluff. :)
You are really good at these, MM!
Great information! Thank you!
please fix your title. Black hat / White hat (evil vs good) Edited* it really does matter.
or even white hat / black hat. White should always come first unless your black hat. But, you also forgot the new. Grey hat.
Will do! Thanks!
Wasn’t aware of Grey hat. Good to know!
@@ArcherU Nothing but love. i hope your channel grows. When talking about hackers "coders/ scripters" be very careful and def increase your home/ office cyber security. Some of the best coders are children. with that being said you can guess what im getting at.
Thank you!@@CallowayMovies
CYBERSECURITY BASELINES FOR ELECTRIC DISTRIBUTION SYSTEMS AND DER: pubs.naruc.org/pub/35247A70-0C45-9652-C6D9-99A77C87200F?_gl=1*fk32am*_ga*OTAzNzYyNTg0LjE2NzMzMTcyNTU.*_ga_QLH1N3Q1NF*MTcwODgzOTgyMy4xMS4wLjE3MDg4Mzk4MjMuMC4wLjA
⏲️
I ran customer websites on my own server at a colo on Linux around 2000. Rootkits were huge. I had a cd-rom I could mount with the common targets of rootkits to hide infection such as ls, ps, etc. it worked well.
It’s been around for a while!
@@ArcherU Are you calling me old? 😆 I installed Slackware from 52 disks I downloaded from a BBS. Now they pay me to do this stuff!
@@CreachterZ if you’re old, than so am I! LOL 😂
@@ArcherU Hugs, brother.
I thought a human was going to explain this to me but…I also have chat gpt…so I’m a little annoyed I got baited into this video…
No bait intended. Mark’s just trying to learn about the cybersecurity world. Thank you for your honest input.