- 222
- 309 898
Sprinto
India
Приєднався 1 лют 2021
Sprinto is the #1 Rated security & Compliance Automation Platform. Companies all over the world trust Sprinto to power their security compliance programs and sprint through security audits without breaking their stride. With over 1 million compliance checks evaluated every month and over 15+ frameworks, Sprinto does the hard work, so compliance doesn't have to be hard for you.
Cybersecurity Expert Breaks Down the Best Social Engineering Scenes from Film and TV
Join cybersecurity expert May Brooks-Kempler as she reacts to some of the best (and most outrageous) social engineering and hacking scenes in movies and TV shows. From clever manipulations to unexpected twists, we dive deep into how hackers use human psychology to bypass security systems-and how Hollywood sometimes gets it hilariously wrong!
In this video, May analyzes iconic scenes where social engineering is at play, showing how real-world hacking techniques often involve manipulation, charm, and exploiting human nature, rather than sophisticated technology. We’ll break down what’s accurate and what’s pure fiction, helping you understand how easily someone can fall victim to social engineers.
If you’re into tech reaction videos, love dissecting how hackers are portrayed in the media, or simply want to learn more about cybersecurity through movie moments, this video is for you. We’ll discuss common social engineering tactics, share real-life stories, and offer tips to protect yourself from falling prey to manipulation.
Follow May Brooks-Kempler for more cybersecurity tips:
LinkedIn ► www.linkedin.com/in/may-brooks-kempler/
Social Media Links:
STAY TUNED: Sprinto ► sprinto.com
Twitter ► Sprintohq
LinkedIn ► www.linkedin.com/company/sprinto-com/
UA-cam ► @sprintohq
#cybersecurity #socialengineering #moviereactions #hackingscenes #techfails #humanvulnerabilities #cybercrime #moviemistakes #techtips #securityawareness #filmreview #hackertips
In this video, May analyzes iconic scenes where social engineering is at play, showing how real-world hacking techniques often involve manipulation, charm, and exploiting human nature, rather than sophisticated technology. We’ll break down what’s accurate and what’s pure fiction, helping you understand how easily someone can fall victim to social engineers.
If you’re into tech reaction videos, love dissecting how hackers are portrayed in the media, or simply want to learn more about cybersecurity through movie moments, this video is for you. We’ll discuss common social engineering tactics, share real-life stories, and offer tips to protect yourself from falling prey to manipulation.
Follow May Brooks-Kempler for more cybersecurity tips:
LinkedIn ► www.linkedin.com/in/may-brooks-kempler/
Social Media Links:
STAY TUNED: Sprinto ► sprinto.com
Twitter ► Sprintohq
LinkedIn ► www.linkedin.com/company/sprinto-com/
UA-cam ► @sprintohq
#cybersecurity #socialengineering #moviereactions #hackingscenes #techfails #humanvulnerabilities #cybercrime #moviemistakes #techtips #securityawareness #filmreview #hackertips
Переглядів: 231
Відео
What's REALLY happens to ISO 27001 in October?
Переглядів 11014 днів тому
Welcome to this week's episode of "This Week in GRC History"! Today, we explore the journey of ISO 27001, one of the most significant compliance frameworks in information security. From its initial release in 2005 to its latest updates, ISO 27001 has played a crucial role in helping organizations manage and protect their data. Book a free demo with our ISO 27001 Experts: sprinto.com/get-a-demo/...
How Sprinto enables compliance management?
Переглядів 131Місяць тому
Sprinto is a next-gen GRC tool that helps with Governance, Risk and Compliance. We've covered the Governance and Risk component in our previous videos. Let's check out how the tool helps with compliance management ✔When you go to the settings section in the security hub, you can select the applicable frameworks for different compliance zones. ✔The controls section provides a quick overview of c...
How to use Sprinto to manage Governance?
Переглядів 60Місяць тому
Governance is a framework by which an organization is managed, directed, and controlled. It comprises policies, procedures, and practices and various components such as governance structure, governance oversight, management reviews, and more. Sprinto has a range of built-in features that help with various aspects of compliance. ✔The centralized health dashboard gives a birds-eye view of the com...
How Sprinto addresses the 'Risk Component' in GRC?
Переглядів 50Місяць тому
Sprinto is a next-gen GRC tool that helps you manage Governance, Risk and Compliance. In this video we'll cover the Risk component. ✔The platform features an integrated risk management dashboard with detailed risk profiles for various risks. ✔You can add new risks from the Sprinto library or upload custom risks unique to your business. ✔You can see inherent risk scores, residual scores, risk ow...
How Sprinto's vendor security questionnaires help evaluate vendor effectiveness?
Переглядів 27Місяць тому
In this video, we'll guide you on how to use Sprinto's vendor security questionnaires to evaluate vendor effectiveness ✔When you log in to your Sprinto account, go to the vendor section in the security hub. ✔You'll see multiple tabs here, one of which is 'vendor security questionnaire'. Sprinto has in-built templates that you can send to your vendors to understand the security controls in place...
How to use Sprinto AI for vendor due diligence?
Переглядів 45Місяць тому
In this video, we will guide you through using Sprinto AI for vendor due diligence. ✔When you login to your Sprinto account, go to the vendor section in the security hub. ✔Go to active vendors and check which vendors have pending due diligence. ✔Once you choose the vendor, go to the documents tab and upload the necessary documents such as SOC 2 report or an ISO 27001 report ✔Next, go to due dil...
How California's CCPA Changed Data Privacy Forever
Переглядів 47Місяць тому
Welcome to this week's episode of "This Week in GRC History!" 🌟 In October 2019, California signed into law one of the most significant privacy regulations in the United States - the California Consumer Privacy Act (CCPA). As the largest U.S. state by GDP and home to tech giants like Google, Apple, and Facebook, California faced increasing challenges with high-profile data breaches and customer...
Cybersecurity Expert Breaks Down Wild Hacking Scenes in Movies - Part 2
Переглядів 113Місяць тому
Cybersecurity Expert Breaks Down Wild Hacking Scenes in Movies - Part 2
The Story of the Worst Data Breach in History: Yahoo's Dark Day
Переглядів 402Місяць тому
The Story of the Worst Data Breach in History: Yahoo's Dark Day
Cybersecurity Expert Reacts to GREAT & TERRIBLE Hacking Scenes.
Переглядів 5962 місяці тому
Cybersecurity Expert Reacts to GREAT & TERRIBLE Hacking Scenes.
Prometeia x Sprinto I Building trust through transparency
Переглядів 1712 місяці тому
Prometeia x Sprinto I Building trust through transparency
CrowdStrike Outage Explained: Causes, Impact, and Future Steps
Переглядів 1,2 тис.3 місяці тому
CrowdStrike Outage Explained: Causes, Impact, and Future Steps
Automating Evidence Collection for Audit Success
Переглядів 2374 місяці тому
Automating Evidence Collection for Audit Success
The Differences Between COBIT 5 and COBIT 2019
Переглядів 2 тис.6 місяців тому
The Differences Between COBIT 5 and COBIT 2019
What is COBIT and why is it important?
Переглядів 2,3 тис.6 місяців тому
What is COBIT and why is it important?
NIST Privacy Framework: Benefits and Best Practices
Переглядів 5277 місяців тому
NIST Privacy Framework: Benefits and Best Practices
Advantages of NIST CSF (Updated for 2.0)
Переглядів 1067 місяців тому
Advantages of NIST CSF (Updated for 2.0)
We Just Raised $20 mil for our Series B - Here's Our Story - Girish Redekar
Переглядів 7937 місяців тому
We Just Raised $20 mil for our Series B - Here's Our Story - Girish Redekar
NIST CSF 2.0: Implement Like a Pro with Auditors
Переглядів 6357 місяців тому
NIST CSF 2.0: Implement Like a Pro with Auditors
Factors.ai: Getting SOC 2 and GDPR compliant with Sprinto
Переглядів 1197 місяців тому
Factors.ai: Getting SOC 2 and GDPR compliant with Sprinto
SOC2 & Beyond: How to Get Compliant with Multiple Frameworks with SOC2 as a Foundation.
Переглядів 937 місяців тому
SOC2 & Beyond: How to Get Compliant with Multiple Frameworks with SOC2 as a Foundation.
NIST CSF 1.1 vs. 2.0: A Side-by-Side Comparison
Переглядів 1,4 тис.8 місяців тому
NIST CSF 1.1 vs. 2.0: A Side-by-Side Comparison
Security Leader’s Guide to Crosswalk Compliance Frameworks
Переглядів 2098 місяців тому
Security Leader’s Guide to Crosswalk Compliance Frameworks
Ensuring Compliance by Zones with Sprinto
Переглядів 2448 місяців тому
Ensuring Compliance by Zones with Sprinto
How to ensure senior management reviews with Sprinto?
Переглядів 2588 місяців тому
How to ensure senior management reviews with Sprinto?
How Sprinto enables integrated risk management?
Переглядів 5608 місяців тому
How Sprinto enables integrated risk management?
How to manage vendor risks with Sprinto?
Переглядів 3238 місяців тому
How to manage vendor risks with Sprinto?
The background music is much btr thn ur explanation 😂😂
Bro you explain it so simple and so well thanks
It would be great if you have removed BGM music
Can you pls speak slowly and clearly?
The background voice in video which comes with the transitions, are high, while hearing it in video through earphone distracts a lot while studying, This is just a feedback , I hope you'll implement
dude, you need to slow it down..its like a fast forwarded edition :D And what is that background music every time when you say about something new, this is not a movie trailer.. sucks!!
Video editing quality was excellent. good job marketing team.
Such a great break down! Really makes you rethink everyday social interactions.
Bro music only music rest is just jibber jabber to the listener.
Great video! What do you like the most about the NIST update?
The music is disturbing to listen your voice
This video has great content, but there seems to be an issue with your audio. It sounds like you might have a bit of a throat infection, and when we try to increase the volume, the background music overpowers your voice.
Very fast.... what is the use of this video if no one understands it..
The sound on this is terrible
😂😂😂😂
Thanks for the breakdown! Could you help me with something unrelated: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
TY!! liked and sub
Helpful video, clear explanations
I don’t understand the logic of buying tumblr to counter Facebook cause this is like walking on shattered glass while sprinkling salts to the ground
Russian state actors were in for a long time. It was easy to bypass people's backup questions as well. Everyone I know has left yahoo because of that.
the downloadable checklist isn't accepting any of my emails
It would be great if you could remake this with clear coherent language. I do feel like towards the end of each sentence, your tone really drops and its challenging to understand. But the content and visuals do look appealing.
sorry to spk but everytime u say properly, and uploading, it sounds some other word and I have to read captions below. is it dubbing error?
9:23, so are we not gonna talk about the video jpeg?
What was MI6 thinking really 😂
LOVE this, it is soooo cooool 🎉❤
Very informative and very cool editing
Never have I ever found cybersecurity so entertaining 😂 We really need more!
We want more!
Part 2 coming soon? 👀
This is brilliant!! Great fun 😂
We love that you loved it! ❤️
Make a video on internal audit process
stop adding background music
Reduce the volume of background music plz
Awesome
Great Assessment, Thank you !
Does an insurance agency that collects Medicare info, social security numbers, amongst other things pertinent information have to be HIPPA compliant?
That's a great question - they would. Depending on the nature of the data that they collect, an insurance provider would either qualify as a covered entity or business associate - both of which would fall under HIPAA.
yes
Thank you for the information, you make more easier to understand everything.
I dont have a business email, it is not accepting gmail, yahoo and hotmail
Would a system that just mediating encrypted card and cardholder data be in scope for PCI DSS certification?
Thank you for this explanation of exactly what I was looking for
We're glad you liked it! ❤
This is the opposite of integrated risk management, RM1 is not risk management
Bro what? 😆
Well explained. Thanks for sharing 🙏🏾
To the Point, Short and sweet 👏👏
What addresses do you accept to get the Free PCI DSS Compliance Checklist download. I've tried 4 and was rejected by the system as not acceptable emails.
Voice is not clear to 👂 listen
Do it in original voice, cuz you think you are enacting to speak in deep voice, but listening to it feels you have some issue in your throat, no offence may be its just me. Peace.
Brilliant video
👍
Thank's for this insane ammount of knowlegde in just 6 minutes, this channel is precious