- 367
- 190 386
Security For You
India
Приєднався 18 січ 2019
Security Professional | CISA | CRISC
Certified Information System Auditor - CISA qualified
Certified in Risk and Information System Control - CRISC qualified
ISO/IEC ISMS - Information Security Risk Management implementation and coordination with cross functional for their status.
Governance, Risk and Compliances tracking.
Conducting Internal audit of applicable controls.
Periodically reviewing effective controls and vulnerabilities.
Implementation of ISMS. Third party risk management.
Talks about #security, #leadership, #securityaudits, #securitymanagement, and #businesscontinuityplanning
Certified Information System Auditor - CISA qualified
Certified in Risk and Information System Control - CRISC qualified
ISO/IEC ISMS - Information Security Risk Management implementation and coordination with cross functional for their status.
Governance, Risk and Compliances tracking.
Conducting Internal audit of applicable controls.
Periodically reviewing effective controls and vulnerabilities.
Implementation of ISMS. Third party risk management.
Talks about #security, #leadership, #securityaudits, #securitymanagement, and #businesscontinuityplanning
How to Calculate Inherent and Residual Risk?
How to Calculate Inherent and Residual Risk?
Переглядів: 44
Відео
Intrusion Detection and Prevention Systems 💥 All discussed - Working, types, difference & Benefits
Переглядів 102Місяць тому
Intrusion Detection and Prevention Systems 💥 All discussed - Working, types, difference & Benefits
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
Переглядів 602 місяці тому
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Переглядів 2434 місяці тому
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
Переглядів 874 місяці тому
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
Переглядів 1414 місяці тому
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
Переглядів 824 місяці тому
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
Переглядів 1014 місяці тому
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Переглядів 934 місяці тому
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Переглядів 1074 місяці тому
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Переглядів 784 місяці тому
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Why Passwords are stored as Hash & not Encrypted? Why Hashing + Salting is secure than Encryption? 💥
Переглядів 2204 місяці тому
Why Passwords are stored as Hash & not Encrypted? Why Hashing Salting is secure than Encryption? 💥
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Переглядів 634 місяці тому
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Переглядів 285 місяців тому
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Переглядів 945 місяців тому
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
Переглядів 435 місяців тому
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Переглядів 1055 місяців тому
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
Переглядів 935 місяців тому
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
Переглядів 1935 місяців тому
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Переглядів 1095 місяців тому
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Переглядів 945 місяців тому
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Переглядів 1055 місяців тому
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
Переглядів 515 місяців тому
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Переглядів 185 місяців тому
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Переглядів 285 місяців тому
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Переглядів 1345 місяців тому
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
Переглядів 755 місяців тому
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Переглядів 1365 місяців тому
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Переглядів 755 місяців тому
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
Переглядів 2145 місяців тому
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
❤❤❤❤
Great example 🎉❤
Glad you like it. 🙏😀
Brother what💀I did not mean to click this shi 😭
Wow very informative! Its best to learn about things like these to stay safe and stay away
FBI i swear! I'm just looking for Deadpool 2 reference when she said IUD and Deadpool said "a bomb?"
Bro really explaining IED's like a highschool teacher, damn...
best idea 💡😜
I've seen banks list positions as Model risk governance specialist. Is this the same as a GRC specialist?
Gonzalez Melissa Johnson Karen Hernandez Ronald
Greetings, I enjoyed your video. Would you say that Preventive Controls are more important than Detective Controls? Thank you.
Martin Timothy Martinez Mary Garcia Timothy
But how to stay safe?
Wilson Robert Martin Maria Hernandez Eric
Moore Patricia Thompson George Clark Richard
Miller Cynthia Johnson Brian Robinson Brian
Well explained and thank u🎉
Glad you like it ❤️😄
How can I contact you?
Connect me on LinkedIn.
Miller Donna Rodriguez David Lewis Scott
Miller Anthony Walker Kenneth Allen Steven
Hi Dushyant, this vdo on 3 Matrices is "Golden" hats off to you.
Thank you for encouraging to do better everytime 🙏😄
Amazing, can we get the ppt used for this?
If SOD is not maintained developer,approver are same as a auditor what action need to be taken?
Can a server in a DMZ pose a security risk to the rest of the network? Like if i put my playstation ip on DMZ network will it put any danger on my other devices if it got hacked ? Thank you in advance.
Great video! The distinctions between data security and data privacy were explained so clearly. Do you think organizations tend to prioritize one over the other, and what impact does that have?
Nice One!
Glad you like it. 😄🙏
Thank you sir ,really helpful.
Most welcome!
Hello, and thanks for this great video. I have a question though (min 2:00). In my opinion, these sound more like key results, meaning concrete achievements as part of a bigger "Objective". Correct? The KPI would be "Customer Satisfaction" but "Reduce the avarage time to complete checkout by 20%" sounds more like an objective. Am I missing something? Thanks!
Superb performance
Thank you
Insightful 💡
Thank you 🙏 😀
Nice one
Thanks for watching 😀
Subscribe to more information
Thank you
Good Effort
Thank you so much. Glad you liked it.
Thanks 👍
Thank you too
👍🏻👍🏻
Nice explanation for hashing with salt.
Thanks for watching
Thank you for the video. Good and simple way to understand hashing, encryption and what hashing with a salt gives as a benefit. Would you recommend a secure, prooven way of implementing hashing with salting that recognized with nationals or international standards?
Nice job. Thanks 🙏
Thank you 🙏😀 Glad you liked it.
This was greatly explained one can start implementing such process Thank you
Thank you so much 😀 Glad you liked it.
Super
Thank you 🙏😄
I have 5 years of Network Security exp. On firewall/proxy/Antivirus n all. I want to go in mngmt but still keep in touch with cybersecurity concepts. Which certification is good and easy for me out of CISM or CRISC ?
Thanks sir. How this is related to data management? Data ownership ? Thanks
Hey, please connect me one to one on LinkedIn. I will guide you.
@@security_for_you sure. thanks.
ua-cam.com/video/H06O925j08w/v-deo.html
Change Management: Ultimate Guide for Auditors | Emergency vs Normal Change
Correction There are 4 components in IED 1. Explosive 2. Detonator 3. Power source 4. Switch And there are 4 different types of switch mechanisms 1. Anti Handling switch which is also Victim Operative ...in this the victim himself is the operator 2. Ambient switch 3. Time Delay switch 4. Remote control or Radio control
Nice work
Thank you! Cheers!
Another great one 👍🏿. Thanks
Thank you. 🙂
Thank you so much 🙌🏾🙏
I hope you found value from this video. 🙏🙂
@@security_for_you Very informative. Thanks 🙏
Video on KPI, KRI and KCI - ua-cam.com/video/_T8p4VbDNbE/v-deo.htmlsi=Q8RpNPHDTRTqElm6
Video on KPI, KRI and KCI - ua-cam.com/video/_T8p4VbDNbE/v-deo.htmlsi=Q8RpNPHDTRTqElm6
Very well explained. Really helpful for someone like me who is a beginner.
Glad it was helpful!