This video has a lot of great information for outlining the process of cybersecurity risk assessment. The sound FX and graphics are distracting/superfluous in the beginning. Steps are well marked with chapter graphic transitions at the start, but by the end there are no transitions. Also, the naming and order of many steps is inconsistent with the listing presented at the top of the video. Regardless, the video is a good introduction to the topic.
Thanks for uploading. This is a great REAL LIFE example of a risk assessment.
This has been so helpful, I am new to the cyber space, and have a job assessment coming up, this has really helped me, thank you!
How did it go?
Thank you, you provided great example
i would love to have practical videos
Thanks. It was really helpful!
0:39 great video! I am new IT consulting. How can get a hard copy of those 9 steps of your Cybersecurity Risk Assessment?
Thanks this is very useful
This video has a lot of great information for outlining the process of cybersecurity risk assessment. The sound FX and graphics are distracting/superfluous in the beginning. Steps are well marked with chapter graphic transitions at the start, but by the end there are no transitions. Also, the naming and order of many steps is inconsistent with the listing presented at the top of the video. Regardless, the video is a good introduction to the topic.
Thank you so much for this video.
Very great informative content. Thank you 🙏
So good!
Very helpful
I love your presentation. Id love to have a conversation with you on the cyberja livestream.
I cant seem to find nist threat catalog. Would you be able to provide link to nist threat catalog please?
Perhaps he's referring to the NIST SP 800-30, annex D and E.
It's an Annex inside of the NIST Risk Assessment Methodology. 800-30
Thanks
Thx!
I am thankful but lazy - would have loved to find these infos in text form 🙂
Thank you very much; this is a great video. Can you share your email, as I have few doubts ?