- 111
- 125 870
Kyber Security
United States
Приєднався 16 тра 2018
Providing IT security and support and SMBs. Woman owned!
How Do I Determine My Organization's Risk Tolerance?
How Do I Determine My Organization's Risk Tolerance?
Переглядів: 11
Відео
Webinar: Save Money & Reduce Risk With Cloud Based Tools
Переглядів 2021 годину тому
Learn how to harness the power of SharePoint, OneDrive, and Intune
Top 10 Questions About Cybersecurity & IT Support
Переглядів 1833 місяці тому
Top 10 Questions About Cybersecurity & IT Support
What Are The Top Challenges To Becoming CMMC Compliant?
Переглядів 54 місяці тому
What Are The Top Challenges To Becoming CMMC Compliant?
Is It Ok To Save Passwords In A Browser?
Переглядів 84 місяці тому
Is It Ok To Save Passwords In A Browser?
How Long Does It Take To Become CMMC Compliant?
Переглядів 114 місяці тому
How Long Does It Take To Become CMMC Compliant?
How Much Does It Cost To Be CMMC Compliant?
Переглядів 184 місяці тому
How Much Does It Cost To Be CMMC Compliant?
What Does the Gap Assessment Process Look Like?
Переглядів 54 місяці тому
What Does the Gap Assessment Process Look Like?
How Can I Afford To Become CMMC Compliant?
Переглядів 44 місяці тому
How Can I Afford To Become CMMC Compliant?
Does My MSP Already Take Care of Cybersecurity?
Переглядів 86 місяців тому
Does My MSP Already Take Care of Cybersecurity?
How Can Reputation Damage Affect An Organization?
Переглядів 346 місяців тому
How Can Reputation Damage Affect An Organization?
Can an MSSP Handle Day-to-Day Issues?
Переглядів 166 місяців тому
Can an MSSP Handle Day-to-Day Issues?
What is a Master Services Agreement (MSA)?
Переглядів 2256 місяців тому
What is a Master Services Agreement (MSA)?
What is the NIST Cybersecurity Framework?
Переглядів 116 місяців тому
What is the NIST Cybersecurity Framework?
What Things Should I Prepare Before Making An MSP Change?
Переглядів 96 місяців тому
What Things Should I Prepare Before Making An MSP Change?
Why Is Cyber Awareness Training Important?
Переглядів 86 місяців тому
Why Is Cyber Awareness Training Important?
Disjointed talk…. Wasn’t clear on the objective nor the solution
Great information! Thanks as always Michael and Bob :)
Promo-SM 😒
Great presentation !
THANK YOOUUUU
You're welcome, glad this helped!
This really helps
for me to understand
Promo*SM
Excellent presentation.
Awesome summary thanks!
What is a good certificate for a lowly programmer to get to get into cybersecurity?
🔥 PЯӨMӨƧM
Do you have any tricks to lock Idenfity Protect detect respond recover to memory
Thank you so much for this video. I’m just getting into GRC and trying to learn as much as I can. This was very enlightening.
If the Navy owns a submarine, and they put it in drydock, they pay the dockmaster the rent. Or they own the dock outright. Right? When the Air Force stores a jet fighter, they pay rent, or they buy the hangar. Right? In no-case does the Navy or Air Force ever tell the property owner, "give us the storage and security for free, and pay all your own associated costs, and maybe we'll give you a contract in the future if you do" Right? To be perfectly clear: The DOD OWNS their own CUI. To then try to push both the responsibility and costs on storage and handling to third parties (Primes and Subs), while expecting their "landlords" to eat the costs upon a promise of a potential contract later, is just not workable. If the Federal Government wants to carry out its "Constitutionally Mandated obligations to secure the Nation", then it must understand that fact that it owns the CUI, and it dictates the controls and storage of CUI, and then it will pay to have those controls and storage implemented for It's CUI. None of the CMMC Regulation for Accountability makes any sense because the DOD is obviously trying to offload National Security back onto the people they are taxing and tasked with securing. The CMMC boondoggle IS the equivalent of telling companies to hire their own consultants to figure out ways to defend their airspace with homemade anti-aircraft missiles. National defense IS the sole province of the Federal Government. It cannot be shrugged-off back onto the people the government is supposed to be defending. It's obvious that The DOD wants to do cybersecurity on the cheap and line their pockets and their nepotist-crony's coffers, so it can keep awarding huge contracts to legacy defense contractors, who are their big political donors (PACs). Anyone who doesn't see this is a fool. Anyone who won't admit it is an accessory. Critical Thinkers will prevail, but don't expect the little guys to eat these costs. The Costs for this will be baked into everything you submit a PO for -or- DiB Subs will just stop doing business with the Federal Government. Round and Round... Back to the drawing board.
huzhu
eh
Isn't this NIST framework just an empty talk/common sense?
Thank you so much.
Hello - this was quite informative - are you able to post the entire session?
great presentation
Can you please show how to crack or bypass Think-Cell software license key
Super.. Every thing summed up nicely for quick learning
Thank you. We appreciate the kind words!
Thanks. Your video was very explainful!
Work net detect identity key security energical connect web from pc
Nice course thank you
Very Nice. Wish you to catch up with the presenter
Genius.. Explained the 5 function the simple and best way...
Simple and easy to grasp!
Empirestore11 on Telegram is the right plug for your cc and dumps.. I just got my valid and working cc from him.... He's good and trustworthy ❤️✅
There might be fake ones out there but real one do exist contact @Darknills on *telegram* he is the real vendor, I got my cc with high balance from him yesterday 🙏
thanks
Great summary. Thank you
The problem is that this nonsense hour is too long to bring any validation to a process, that is a psy ops reality gone wild. Not a psychological but psychotic operational clusterfuck. Do I have to sing to the choir? A GooTube random algorithm generating, artificial intelligence? military sand box that needs cleaning, replacing..upgrading? 2 years..2 months..2 days..2 hours..2 min. 2 sec..2 anything before...the gap..bitch. More like the 12 year media time loop. 1963.. Camelot's last virtual staff ride... and 1975..Geraldo..I will work in front of a green screen forever and never know it, 'America Tonight' the Zapruder film gets shown publicly for the first time. Then becomes the standard looped video proof..of the event? Nancy Pelosi says for the cameras, we must pass Obama Care in order to be able to read it." Both 12 year time loops need patching before the kids...go out to play. If I have to do it all myself...oh please let me...as if I need help or permission... ....12 hours from this time stamp..proof of profanity and less...will be moar.~
If the dark web did not exist it would have to be invented. The same way you would allow me to sell you a $5 pillow for $85.
IF you follow the NIST Framework to the letter, will that severely reduce gap towards GDPR and HIPAA and compliance?