Conducting a cybersecurity risk assessment

Поделиться
HTML-код
  • Опубликовано: 4 сен 2024

Комментарии • 27

  • @4agereligion
    @4agereligion 8 дней назад

    Thanks a lot Sir
    Clear and concise explanation

  • @audreymciver4863
    @audreymciver4863 5 лет назад +4

    If I knew what company or organization was mine I would go far and beyond my call of duty to maintain compliance. Communication is truly the key. I need to know.

  • @audreymciver4863
    @audreymciver4863 5 лет назад +5

    Thank You for your detailed presentation it is greatly appreciated.

  • @theaprilrayshow5911
    @theaprilrayshow5911 5 лет назад +1

    This is very helpful while I’m in my CYB/100 class this week

  • @juliodelcid4168
    @juliodelcid4168 4 года назад +1

    Great video. Would have been nice to see a ISO 31000 mention, nevertheless great presentation.

    • @itgovernanceusa
      @itgovernanceusa  4 года назад +1

      Thanks - ISO 31000 is indeed a robust risk management standard that provides helpful guidance for those interested in pursuing more in-depth information about risk management.

  • @khalilzadjali1747
    @khalilzadjali1747 4 года назад +1

    Thank you for the presentation .

  • @ZohaibHassanAfridi
    @ZohaibHassanAfridi Год назад

    Excellent Explanation

  • @supriyantosp2580
    @supriyantosp2580 4 года назад

    thank you for you presentation. This is very meaningful for me.

  • @queenbeebakardi
    @queenbeebakardi 3 года назад

    can you please explain a RAR risk assessment report and components

  • @CyberSecurityII
    @CyberSecurityII 3 года назад

    Great video.

    • @itgovernanceusa
      @itgovernanceusa  3 года назад

      Thanks Ian, please don't forget to subscribe if you haven't already

  • @audreymciver4863
    @audreymciver4863 5 лет назад +1

    I still am questioning why there is a Apple Watch connected to my account? I am not understanding this and the Mac OS. I need answers.

  • @virenderk4943
    @virenderk4943 4 года назад

    Risk assessment criteria, kindly add please.

    • @ITGovernanceLtd
      @ITGovernanceLtd 4 года назад

      Hi Virender. You can find out more on the criteria in our blog post: www.itgovernance.co.uk/blog/what-is-an-iso-27001-risk-assessment-methodology

  • @audreymciver4863
    @audreymciver4863 5 лет назад +1

    I don’t know what go to webinar is I only know how to do what I am doing on utube

  • @audreymciver4863
    @audreymciver4863 5 лет назад +1

    There is no reporting on apple website!

  • @audreymciver4863
    @audreymciver4863 5 лет назад

    Is sales force reputable?

  • @audreymciver4863
    @audreymciver4863 5 лет назад

    Is trusted CI good?

  • @audreymciver4863
    @audreymciver4863 5 лет назад +1

    We need to identify microsoft and icloud account take over there is clearly some threat there as I have not been able to do anything with these two for years.

  • @audreymciver4863
    @audreymciver4863 5 лет назад

    I’m not sure about this new cloud I have many red flags.

  • @audreymciver4863
    @audreymciver4863 5 лет назад

    And i don’t understand why i was never informed of any of this.

  • @hmj8469
    @hmj8469 4 года назад +1

    Did you ever call Olga Back? LoL

    • @victoriabennett6312
      @victoriabennett6312 2 года назад

      the irony is its a cybersecurity topic and now olgas phone number has now been compromised.

  • @audreymciver4863
    @audreymciver4863 5 лет назад +1

    I have nothing to do with Facebook . I did not create Facebook. I did not create Facebook.

  • @ryche.rising
    @ryche.rising 3 года назад

    What lack of faith about open source software, they actually are more secure, accountable and fixable than black box proprietary software.