Channel Avatar

CISO Global @UCN8_fm7E0C4eGbeGXC1Pryw@youtube.com

18K subscribers - no pronouns :c

A leader in cybersecurity and compliance services, CISO Glob


04:28
The Polar Bear in Your Kitchen: A Cybersecurity Analogy
31:24
Are You Prepared? - Incident Response 101
39:17
Understanding CMMC 2.0: New Rules, Guidelines, and Timelines
28:11
Bleeding Credit Unions Dry: The Story of Sloppy and Broken Operations
34:38
Achievements and Aspirations: Reflecting on 2023 and Predicting 2024
35:13
PCI 4.0: What is coming, and what do you need to do about it?
07:07
CISO Global – Building a Culture of Cybersecurity
29:21
How to Secure Remote Workers and Cloud Access at the Same Time
02:14
Introducing the Argo Security Management Platform
02:37
Becoming FedRAMP and StateRAMP Authorized Part 1
02:13
Why You Should Consider Enhanced Email Solutions
01:36
Bypassing Endpoint Security
33:31
First to Fall - A LinkedIn Live Event
01:14
Network Design and Protection for Small to Mid-Sized Banks & Credit Unions
01:06
Compliance Strategy for Small to Mid-Sized Banks and Credit Unions
03:01
ROI on Cybersecurity - CISO Global
01:44
What's Next in Cybersecurity for Banks?
01:33
Cyber Maturity Allows a Bank to Think Big
03:03
Managing a Bank's Third-Party Vendors
02:11
How Banks Improve Cybersecurity through Secured Managed Services (SMS)
36:35
Does Chat GPT Know Your Secrets?
02:11
Compound Effects: What Does it Mean to be Ready and Resilient
01:06
What Does It Mean to be Threat-Informed and Ready & Resilient?
01:02
The Evolution of Women in Cybersecurity
02:12
Protecting Nonprofits From Cyber Attacks
01:38
Biometrics in a Future Without Passwords
04:40
What It Means to be Threat Informed
02:50
Hiring the Best & Inclusivity at CISO Global
23:28
Demystifying XDR: What's the 'real' XDR and how can it transform your security strategy?
07:08
CMMC 2.0: What Should You Be Doing NOW?
04:39
Creating a Culture of Cybersecurity
32:28
Purple Team Engagement: How to Improve Your Next Pen Test Result
22:49
Cerberus MVP Nucleus Training
08:17
Cerberus Sentinel Rings The Nasdaq Stock Market Opening Bell Feb 23
01:01
Who is protecting your environment while you're away?
02:51
Authenticated versus Unauthenticated Vulnerability Assessments
01:19
Does SOC 2 Type II Require Penetration Testing?
03:30
Is Penetration Testing Required for HIPAA Compliance?
09:46
7 Phase Penetration Testing Methodology
02:00
Which Certifications Should You Get to Start a Penetration Testing Career
03:28
Why Penetration Testing is Important During COVID-19
06:57
Hackers Use Cyber Monday Emails to Take Over Your System: Phishing
03:43
Alpine Security's Security Awareness Training Sample: Help Me and Authority Figure Scenarios
02:17
How to Setup VirtualBox Shared Folders with Kali VM and Windows 10 Host
05:24
How Hackers Use Emails to Steal Passwords: Phishing
04:51
How Hackers Use Emails to Take Over Your System: Phishing
08:37
WiFi Hacking: How to Use Wifite to Capture WPA2 Handshakes
05:19
WiFi Hacking: ALFA AWUS036ACH Setup
04:02
Medical Device Security: Patient Safety Takes Precedence Over Privacy
06:41
How To Install Kali 2019.3 in VirtualBox
03:23
How to Convert a VirtualBox Disk File (.vdi) to a Raw Image File
15:37
How to Use Zenmap to Discover Your Network Devices
05:27
Alpine's Cybersecurity Training Rocketed My Career - Testimonials
05:31
Cybersecurity Certifications for Bad Test Takers
03:30
Data Breach Prevention is Critical Now
06:04
Get Cybersecurity Certified Even if You are Bad at Tests, Inexperienced, & Wonder How to Start
07:54
Skipping a Cybersecurity College Degree is Good for Your Career and Pocket Book
03:30
What to Do After Your Business is Hacked
05:53
Ultimate Cybersecurity Advice for Small Business Owners
05:01
90% of Small Business Owners will Ignore this in 2020: 70% of Cyber Attacks Will Be Against Them