Kyber Security
Kyber Security
  • 111
  • 125 870
How Do I Determine My Organization's Risk Tolerance?
How Do I Determine My Organization's Risk Tolerance?
Переглядів: 11

Відео

Webinar: Save Money & Reduce Risk With Cloud Based Tools
Переглядів 2021 годину тому
Learn how to harness the power of SharePoint, OneDrive, and Intune
Should I Move My Servers to The Cloud?
Переглядів 14День тому
Should I Move My Servers to The Cloud?
Contact Us
Переглядів 7Місяць тому
Contact Us
Top 10 Questions About Cybersecurity & IT Support
Переглядів 1833 місяці тому
Top 10 Questions About Cybersecurity & IT Support
Top 10 Questions about CMMC
Переглядів 244 місяці тому
Top 10 Questions about CMMC
Is Anyone Going To Steal My Data?
Переглядів 84 місяці тому
Is Anyone Going To Steal My Data?
What Are The Top Challenges To Becoming CMMC Compliant?
Переглядів 54 місяці тому
What Are The Top Challenges To Becoming CMMC Compliant?
What Happens When a Server Fails?
Переглядів 124 місяці тому
What Happens When a Server Fails?
Is It Ok To Save Passwords In A Browser?
Переглядів 84 місяці тому
Is It Ok To Save Passwords In A Browser?
How Long Does It Take To Become CMMC Compliant?
Переглядів 114 місяці тому
How Long Does It Take To Become CMMC Compliant?
How Much Does It Cost To Be CMMC Compliant?
Переглядів 184 місяці тому
How Much Does It Cost To Be CMMC Compliant?
What Does the Gap Assessment Process Look Like?
Переглядів 54 місяці тому
What Does the Gap Assessment Process Look Like?
What is CMMC?
Переглядів 84 місяці тому
What is CMMC?
How Can I Afford To Become CMMC Compliant?
Переглядів 44 місяці тому
How Can I Afford To Become CMMC Compliant?
Do I Need To Back Up My Cloud Data?
Переглядів 44 місяці тому
Do I Need To Back Up My Cloud Data?
What is Vulnerability Scanning?
Переглядів 184 місяці тому
What is Vulnerability Scanning?
What is a SSP?
Переглядів 24 місяці тому
What is a SSP?
What is a POAM?
Переглядів 134 місяці тому
What is a POAM?
What If I Do Not Comply With CMMC?
Переглядів 104 місяці тому
What If I Do Not Comply With CMMC?
What is FCI and CUI?
Переглядів 144 місяці тому
What is FCI and CUI?
Does My MSP Already Take Care of Cybersecurity?
Переглядів 86 місяців тому
Does My MSP Already Take Care of Cybersecurity?
How Can Reputation Damage Affect An Organization?
Переглядів 346 місяців тому
How Can Reputation Damage Affect An Organization?
Can an MSSP Handle Day-to-Day Issues?
Переглядів 166 місяців тому
Can an MSSP Handle Day-to-Day Issues?
What is a Master Services Agreement (MSA)?
Переглядів 2256 місяців тому
What is a Master Services Agreement (MSA)?
What is Defense in Depth?
Переглядів 106 місяців тому
What is Defense in Depth?
What is Cybersecurity?
Переглядів 146 місяців тому
What is Cybersecurity?
What is the NIST Cybersecurity Framework?
Переглядів 116 місяців тому
What is the NIST Cybersecurity Framework?
What Things Should I Prepare Before Making An MSP Change?
Переглядів 96 місяців тому
What Things Should I Prepare Before Making An MSP Change?
Why Is Cyber Awareness Training Important?
Переглядів 86 місяців тому
Why Is Cyber Awareness Training Important?

КОМЕНТАРІ

  • @jann9507
    @jann9507 8 місяців тому

    Disjointed talk…. Wasn’t clear on the objective nor the solution

  • @brandonchoquette691
    @brandonchoquette691 11 місяців тому

    Great information! Thanks as always Michael and Bob :)

  • @thaliagerardo3477
    @thaliagerardo3477 Рік тому

    Promo-SM 😒

  • @kentrelc1
    @kentrelc1 Рік тому

    Great presentation !

  • @DeemaAlharbi-r7f
    @DeemaAlharbi-r7f Рік тому

    THANK YOOUUUU

  • @DaBredening
    @DaBredening Рік тому

    This really helps

  • @jii8271
    @jii8271 Рік тому

    Promo*SM

  • @devspice
    @devspice Рік тому

    Excellent presentation.

  • @bigqdone
    @bigqdone Рік тому

    Awesome summary thanks!

  • @DelandaBaudLacanian
    @DelandaBaudLacanian Рік тому

    What is a good certificate for a lowly programmer to get to get into cybersecurity?

  • @nash1072
    @nash1072 2 роки тому

    🔥 PЯӨMӨƧM

  • @TechViking
    @TechViking 2 роки тому

    Do you have any tricks to lock Idenfity Protect detect respond recover to memory

  • @humoroustumorous6642
    @humoroustumorous6642 2 роки тому

    Thank you so much for this video. I’m just getting into GRC and trying to learn as much as I can. This was very enlightening.

  • @apstech4618
    @apstech4618 2 роки тому

    If the Navy owns a submarine, and they put it in drydock, they pay the dockmaster the rent. Or they own the dock outright. Right? When the Air Force stores a jet fighter, they pay rent, or they buy the hangar. Right? In no-case does the Navy or Air Force ever tell the property owner, "give us the storage and security for free, and pay all your own associated costs, and maybe we'll give you a contract in the future if you do" Right? To be perfectly clear: The DOD OWNS their own CUI. To then try to push both the responsibility and costs on storage and handling to third parties (Primes and Subs), while expecting their "landlords" to eat the costs upon a promise of a potential contract later, is just not workable. If the Federal Government wants to carry out its "Constitutionally Mandated obligations to secure the Nation", then it must understand that fact that it owns the CUI, and it dictates the controls and storage of CUI, and then it will pay to have those controls and storage implemented for It's CUI. None of the CMMC Regulation for Accountability makes any sense because the DOD is obviously trying to offload National Security back onto the people they are taxing and tasked with securing. The CMMC boondoggle IS the equivalent of telling companies to hire their own consultants to figure out ways to defend their airspace with homemade anti-aircraft missiles. National defense IS the sole province of the Federal Government. It cannot be shrugged-off back onto the people the government is supposed to be defending. It's obvious that The DOD wants to do cybersecurity on the cheap and line their pockets and their nepotist-crony's coffers, so it can keep awarding huge contracts to legacy defense contractors, who are their big political donors (PACs). Anyone who doesn't see this is a fool. Anyone who won't admit it is an accessory. Critical Thinkers will prevail, but don't expect the little guys to eat these costs. The Costs for this will be baked into everything you submit a PO for -or- DiB Subs will just stop doing business with the Federal Government. Round and Round... Back to the drawing board.

  • @Meruda05
    @Meruda05 2 роки тому

    huzhu

  • @Meruda05
    @Meruda05 2 роки тому

    eh

  • @zuowang5481
    @zuowang5481 2 роки тому

    Isn't this NIST framework just an empty talk/common sense?

  • @beansprout_apg886
    @beansprout_apg886 2 роки тому

    Thank you so much.

  • @jackieo7113
    @jackieo7113 2 роки тому

    Hello - this was quite informative - are you able to post the entire session?

  • @cyberprofessional9834
    @cyberprofessional9834 2 роки тому

    great presentation

  • @johnsonroy7233
    @johnsonroy7233 3 роки тому

    Can you please show how to crack or bypass Think-Cell software license key

  • @jaikisan3393
    @jaikisan3393 3 роки тому

    Super.. Every thing summed up nicely for quick learning

    • @KyberSecurity
      @KyberSecurity 3 роки тому

      Thank you. We appreciate the kind words!

  • @digitalinnovationtechs8
    @digitalinnovationtechs8 3 роки тому

    Thanks. Your video was very explainful!

  • @sousosisi316
    @sousosisi316 3 роки тому

    Work net detect identity key security energical connect web from pc

  • @ITHunt-
    @ITHunt- 3 роки тому

    Nice course thank you

  • @rithwiks
    @rithwiks 3 роки тому

    Very Nice. Wish you to catch up with the presenter

  • @niral.shakya
    @niral.shakya 3 роки тому

    Genius.. Explained the 5 function the simple and best way...

  • @TanujPandey18
    @TanujPandey18 4 роки тому

    Simple and easy to grasp!

  • @johnwood9375
    @johnwood9375 4 роки тому

    Empirestore11 on Telegram is the right plug for your cc and dumps.. I just got my valid and working cc from him.... He's good and trustworthy ❤️✅

  • @watchmine5531
    @watchmine5531 4 роки тому

    There might be fake ones out there but real one do exist contact @Darknills on *telegram* he is the real vendor, I got my cc with high balance from him yesterday 🙏

  • @rumildaolik4905
    @rumildaolik4905 4 роки тому

    thanks

  • @ifeanyiok8916
    @ifeanyiok8916 4 роки тому

    Great summary. Thank you

  • @TheOrlowskiObjective
    @TheOrlowskiObjective 4 роки тому

    The problem is that this nonsense hour is too long to bring any validation to a process, that is a psy ops reality gone wild. Not a psychological but psychotic operational clusterfuck. Do I have to sing to the choir? A GooTube random algorithm generating, artificial intelligence? military sand box that needs cleaning, replacing..upgrading? 2 years..2 months..2 days..2 hours..2 min. 2 sec..2 anything before...the gap..bitch. More like the 12 year media time loop. 1963.. Camelot's last virtual staff ride... and 1975..Geraldo..I will work in front of a green screen forever and never know it, 'America Tonight' the Zapruder film gets shown publicly for the first time. Then becomes the standard looped video proof..of the event? Nancy Pelosi says for the cameras, we must pass Obama Care in order to be able to read it." Both 12 year time loops need patching before the kids...go out to play. If I have to do it all myself...oh please let me...as if I need help or permission... ....12 hours from this time stamp..proof of profanity and less...will be moar.~

  • @TheOrlowskiObjective
    @TheOrlowskiObjective 4 роки тому

    If the dark web did not exist it would have to be invented. The same way you would allow me to sell you a $5 pillow for $85.

  • @macshild
    @macshild 4 роки тому

    IF you follow the NIST Framework to the letter, will that severely reduce gap towards GDPR and HIPAA and compliance?