How to Start Information Security Program in Enterprise Step by Step
Вставка
- Опубліковано 15 вер 2024
- If you're interested in learning more about information Security Program , then this video is for you. We'll be discussing about how information security risk program implement in the organization on a very high level
I would like to thanks Ashish , Mukul Gupta , SIVA and Chetan Jain for helping out for this content :)
GRC Interview Series
www.youtube.co....
Other #cybersecurity Videos
www.youtube.co....
SOC Video Playlist
www.youtube.co....
Follow me on Instagram
www.instagram.....
Follow me on Facebook
/ prabhnairinf. .
Just simple, easy to understand and very informative videos...your just great sir🤗
It's just fabulous! You have described the Information Security Program in such a way so anyone can understand easily. Thank you so much for bringing such videos.
Eagerly waiting for this stuff 🙌 😌
Thanku:)
superb and thank you so much😍
Very informative . Please keep making video on similar topics. Thank you Sir
Thanku:)
I just want this video that what information security person do in businesses
Thankyou
And make parts on that topic sir
Thanku:)
Thank you Prabh❤ God bless you
Nice video, Prabh
I wish you have a serious on this topic. I really need it.
Great video ❤
Keep it up prabh
Hello Prabh, fantastic video. Ease keep producing videos on GRC. If you could share some sample questionnaires to understand what types of questions are asked from teams to gather the information and understand the gaps.
Check i already made grc interview video
Thanks Prabh, great effort,
Thanku:)
thanks Prabh
Theoriticaly! In the real world its totaly different! The same thing happened with our consultant! That he did not understand is they hired him to push technical people to find a way to secure anything without paying money! Because all the thing the consultant listed are already told to everybody! But they thought technical people are lazy because they believe no need for paying a license for firewall or anything else, it should be taping on a keyboard faster like in movies and bam!!! It secured!!!
That true :) but this is how I build cyber sec strategy for an firm :)
you are awesome Guru ji
Thanku:)
Hello sir, you mentioned in point 3 to Adopt One Framework, can that framework be CIS baselines?
Which framework most of the company adopt ?
Please create a video on risk assessment approach and mgmt
Working on same :)