IT Governance Ltd provides specialist services and solutions to businesses and companies who need help in information security, data protection, compliance and risk assessment.
Can you please brief or say time of video where the insolvency of supplier is?
@JasonRiley-se4npАй бұрын
Really liked your video. Thank you for sharing your insights on ISO 27001 . I had a questions regarding While the video mentions ISO 27001 applies to all organizations, are there any industry-specific considerations or best practices for implementing an ISMS within a particular sector? I have recently started a new Saas , and I am looking forward if anyone can help me in this
@sonya12994Ай бұрын
I just read this discussion about ISO 27001 for small SaaS companies. It's a great question, especially since building trust is so crucial for startups. Having gone through the ISO 27001 process myself with a small team, it's definitely achievable. There are tons of resources out there to help you navigate it, and honestly, the boost in client confidence is worth the effort. I have a partner that can automate 70% of the compliance work streams and help determine a risk score and steps for remediation, all under $8k (small business ) They are giving out sweetheart deals while coming out of stealth mode. Let me know
@JasonRiley-se4npАй бұрын
@@sonya12994 Honestly, while it seems important, I'm also a bit new to this whole ISO 27001 world. Is there anything you could recommend to help me learn more about it? Maybe resources or guides specifically geared towards small businesses like mine? Knowing how to navigate the process and the potential benefits for client confidence are really valuable insights. I'd love to hear more!
@sonya12994Ай бұрын
@@JasonRiley-se4np Vanta , SecureFrame are the big player in the market which will cost you around $16k annually, As a startup that amount can be very high for you. There is a tool called SecureSlate which will help you to provide all the necessary tools to achieve ISO 27001 certification in less time period
@reneeshoАй бұрын
None...afraid. newbie
@reneeshoАй бұрын
Lets Go. Have a good session Sir
@l2nc075Ай бұрын
thanks for explaining man, just took half your script and pasted it into my assignment
@rauhashimaneni4950Ай бұрын
watching from omuthiya Satelite office Domestic Taxess
@VidyaNair-fm6ue2 ай бұрын
What percentage of patching on end point devices, network devices etc., is acceptable to attain Cyber Essential certifications?
@akulaharichandnarau52802 ай бұрын
Good basic info on PCIDSS. Content is good .
@davidtuck31322 ай бұрын
An excellent day with interesting panel discussion, thank you IT Governance.
@arthurmiddleton24342 ай бұрын
"Promosm"
@rohitraj22953 ай бұрын
Do you know at which level they do scaning on qualys
@solutionanalysts13 ай бұрын
The law applies to the processing of individuals’ personal data and sensitive data in Saudi Arabia. It will grant individuals rights to protect their personal data, including the right to access, rectify, erase, and restrict others from accessing their data.
@gala-technology3 ай бұрын
Learn how one company tackled PCI Compliance and fraud related chargebacks, the compelling story of Secure Order Transfer (SOTpay)'s inception: kzread.info/dash/bejne/k4SAt9uqnLzOY8Y.html
@goodness_james3 ай бұрын
Great video. The music in the background is lovely but it's too loud.
@MajorethMoralde2 ай бұрын
1:25
@pramodppal3 ай бұрын
How do you take polls in the PPT ?
@lawrencebishton90714 ай бұрын
prison sentance
@dorisschott-neuse85414 ай бұрын
Thanks a lot for this comprhensive and highly knowledgeable overview of DORA 🎯
@charlessmith2634 ай бұрын
I looked into the repercussions of email abuse, including spamming. The consequences can be severe. Reputational damage - this means the sender's email score can drop dangerously low (like from 98 to down to as low as 15). If the sender score is way too low, domain email blacklist companies can flag the email domain of the sender to anti-spam companies. The worst is Spamhaus Zen blocklist. Get on that - and your email send reputation goes down to 0, and this blocklist is extremely difficult to de-list from. Forget about emailing forever if this happens! There are other penalties that one can face. Non-criminally, this can mean the sender can be fired from work or disciplined at work (which includes a suspension of email privileges, or even a suspension from all Internet activities). Criminally, the sender could face strong fines for violating the CAN-SPAM act or even go to jail. Cyberstalking charges are also possible if the email abuse techniques are intended to intentionally harass someone, and especially if repeated.
@user-ls1zo2cq4u4 ай бұрын
Can i use this as a example for my presentation? Thank you in advance for responding.
@jyotiranjanj33314 ай бұрын
Great overview and insights on DORA
@adelekeamos7634 ай бұрын
Very on point! Neatly summed!
@yousefalmtrb62374 ай бұрын
I think the ISO/IEC 27001 does not include GDPR and that thing is written inside their document
@adamc69964 ай бұрын
Very good overview of approach to DORA.
@orestfayer69994 ай бұрын
Супер😮😊
@dorisschott-neuse85415 ай бұрын
Thanks so much for all this information 🤩
@dorisschott-neuse85415 ай бұрын
This was really interesting - thx for all this information!
@Satoshirecov3ry5 ай бұрын
So many people are massively unaware of the severity of the danger a phishing attack can cause, the worst part of a phishing attack is that it can go undetected for months or more. You will be losing valuable resources with your identity being compromised, without your knowledge. I know how damaging this could be to a person because my sister-in-law was a victim and she lost 6 figures amount over a few months. It took special intervention from me to investigate and sought justice on her behalf. Those is similar situation should search this username on google.
@VictoriaSobocki5 ай бұрын
Great video.
@neilbaal67585 ай бұрын
If half of HR clicked link and entered their credentials then threat actor has likely captured an authentication token and has logged into one of the accounts, they could set a mass forwarding rule or copy off emails, or exfiltrate documents, so as well as resetting all of the HR users passwords you should revoke all sessions, this would force out the threat actor who could no longer login as the password is changed and the user would be prompted for MFA.
@jcornwall62285 ай бұрын
Spot on. That's exactly what we do. Revoking tokens and resetting passwords are definitely a must
@neilbaal67585 ай бұрын
Agreed, shame it was missed here, makes me wonder is this all theory being presented
@vernimotinga12775 ай бұрын
where can I find these slides
@romano-gatto5 ай бұрын
This is a really clear and well delivered intro to Cyber Essentials. Appreciate the way you have cross-referenced with ISO and also provided a broader context of defence-in-depth👍
@MMAJOEY696 ай бұрын
$ICP is gonna skyrocket
@richlee25766 ай бұрын
Any idea as to why companies that filed 10-K forms on Friday, 12/15 have decided to ignore the disclosure requirements? After asking the question, I see the answer, “annual reports for fiscal years ending on or after December 15. 2023.”
@AfroNation20236 ай бұрын
Great
@MrZaytova6 ай бұрын
This was not a waste of time this is great for company’s that need processes updated or built because certain questions have not been answered or thought of before. Also great exposure for a tabletop exercise. One recommendation: if not speaking then maybe mute and turn of camera. No need to be on camera/audio if not speaking. Just easier on those presenting and not needing the pressure of just sitting on camera if that person is not the focus at the time.
@carmendestefano17803 ай бұрын
This went right over your head at the speed of light, didn't it? Lmao
@infocertsitsecuritytrainin39236 ай бұрын
Nice. Here is how you can acquire PCI DSS certification for a career boost. kzread.info/dash/bejne/ZomDtbiNgbPMecY.htmlsi=10MMKy1VkvZJzHQs
@infocertsitsecuritytrainin39236 ай бұрын
Nice. Here is how you can acquire PCI DSS certification for a career boost. kzread.info/dash/bejne/ZomDtbiNgbPMecY.htmlsi=10MMKy1VkvZJzHQs
@nicolehall17407 ай бұрын
That background music is most annoying and takes away from the learning experience.
@luddena7 ай бұрын
slides were never sent out for this, is it possible to get a copy?
@ITGovernanceLtd7 ай бұрын
Hi Luddena, The presentation slides and recording have been distributed via email to all delegates that registered. In the event that you have not received them, you may access and download the slides for the webinar by visiting our website: www.itgovernance.co.uk/dora-compliance-and-what-it-means-for-the-financia Kind regards
@POETCERA7 ай бұрын
I wonder how much money these “breaches” bring in for these companies?
@ammudev39397 ай бұрын
Don't waste people's time! Zero quality!!
@Abaddon33368 ай бұрын
great quality info
@reneesho8 ай бұрын
Alan Calder...The Don....Cool Delivery.....
@stanley73909 ай бұрын
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *GrindTechiei* . Every time you do a good job it reflects on how honest and kind you’re,, I won’t forget easily this recovery you did for me•
@nathanleonard12839 ай бұрын
Very informative. Thanks for this.
@user-rm1vo9kr3t9 ай бұрын
I have mistakenly deleted the videos of Cyber security under a African person with related to Cyber security so l want to see again all this videos of 9+ hours Cyber security
@user-rm1vo9kr3t9 ай бұрын
I am interested of my government lndia lT department because long six years l am requesting to BJP government they are hacking my notes on micromaxQ382 of imei1-911567754510476 instead of helping me they stolen my phone they have my SBI account 33319782867 connecting with millions account but they doesn't give me a penny l want to recover my stolen phone and my data all and finalize a little money help me
Пікірлер
Can you please brief or say time of video where the insolvency of supplier is?
Really liked your video. Thank you for sharing your insights on ISO 27001 . I had a questions regarding While the video mentions ISO 27001 applies to all organizations, are there any industry-specific considerations or best practices for implementing an ISMS within a particular sector? I have recently started a new Saas , and I am looking forward if anyone can help me in this
I just read this discussion about ISO 27001 for small SaaS companies. It's a great question, especially since building trust is so crucial for startups. Having gone through the ISO 27001 process myself with a small team, it's definitely achievable. There are tons of resources out there to help you navigate it, and honestly, the boost in client confidence is worth the effort. I have a partner that can automate 70% of the compliance work streams and help determine a risk score and steps for remediation, all under $8k (small business ) They are giving out sweetheart deals while coming out of stealth mode. Let me know
@@sonya12994 Honestly, while it seems important, I'm also a bit new to this whole ISO 27001 world. Is there anything you could recommend to help me learn more about it? Maybe resources or guides specifically geared towards small businesses like mine? Knowing how to navigate the process and the potential benefits for client confidence are really valuable insights. I'd love to hear more!
@@JasonRiley-se4np Vanta , SecureFrame are the big player in the market which will cost you around $16k annually, As a startup that amount can be very high for you. There is a tool called SecureSlate which will help you to provide all the necessary tools to achieve ISO 27001 certification in less time period
None...afraid. newbie
Lets Go. Have a good session Sir
thanks for explaining man, just took half your script and pasted it into my assignment
watching from omuthiya Satelite office Domestic Taxess
What percentage of patching on end point devices, network devices etc., is acceptable to attain Cyber Essential certifications?
Good basic info on PCIDSS. Content is good .
An excellent day with interesting panel discussion, thank you IT Governance.
"Promosm"
Do you know at which level they do scaning on qualys
The law applies to the processing of individuals’ personal data and sensitive data in Saudi Arabia. It will grant individuals rights to protect their personal data, including the right to access, rectify, erase, and restrict others from accessing their data.
Learn how one company tackled PCI Compliance and fraud related chargebacks, the compelling story of Secure Order Transfer (SOTpay)'s inception: kzread.info/dash/bejne/k4SAt9uqnLzOY8Y.html
Great video. The music in the background is lovely but it's too loud.
1:25
How do you take polls in the PPT ?
prison sentance
Thanks a lot for this comprhensive and highly knowledgeable overview of DORA 🎯
I looked into the repercussions of email abuse, including spamming. The consequences can be severe. Reputational damage - this means the sender's email score can drop dangerously low (like from 98 to down to as low as 15). If the sender score is way too low, domain email blacklist companies can flag the email domain of the sender to anti-spam companies. The worst is Spamhaus Zen blocklist. Get on that - and your email send reputation goes down to 0, and this blocklist is extremely difficult to de-list from. Forget about emailing forever if this happens! There are other penalties that one can face. Non-criminally, this can mean the sender can be fired from work or disciplined at work (which includes a suspension of email privileges, or even a suspension from all Internet activities). Criminally, the sender could face strong fines for violating the CAN-SPAM act or even go to jail. Cyberstalking charges are also possible if the email abuse techniques are intended to intentionally harass someone, and especially if repeated.
Can i use this as a example for my presentation? Thank you in advance for responding.
Great overview and insights on DORA
Very on point! Neatly summed!
I think the ISO/IEC 27001 does not include GDPR and that thing is written inside their document
Very good overview of approach to DORA.
Супер😮😊
Thanks so much for all this information 🤩
This was really interesting - thx for all this information!
So many people are massively unaware of the severity of the danger a phishing attack can cause, the worst part of a phishing attack is that it can go undetected for months or more. You will be losing valuable resources with your identity being compromised, without your knowledge. I know how damaging this could be to a person because my sister-in-law was a victim and she lost 6 figures amount over a few months. It took special intervention from me to investigate and sought justice on her behalf. Those is similar situation should search this username on google.
Great video.
If half of HR clicked link and entered their credentials then threat actor has likely captured an authentication token and has logged into one of the accounts, they could set a mass forwarding rule or copy off emails, or exfiltrate documents, so as well as resetting all of the HR users passwords you should revoke all sessions, this would force out the threat actor who could no longer login as the password is changed and the user would be prompted for MFA.
Spot on. That's exactly what we do. Revoking tokens and resetting passwords are definitely a must
Agreed, shame it was missed here, makes me wonder is this all theory being presented
where can I find these slides
This is a really clear and well delivered intro to Cyber Essentials. Appreciate the way you have cross-referenced with ISO and also provided a broader context of defence-in-depth👍
$ICP is gonna skyrocket
Any idea as to why companies that filed 10-K forms on Friday, 12/15 have decided to ignore the disclosure requirements? After asking the question, I see the answer, “annual reports for fiscal years ending on or after December 15. 2023.”
Great
This was not a waste of time this is great for company’s that need processes updated or built because certain questions have not been answered or thought of before. Also great exposure for a tabletop exercise. One recommendation: if not speaking then maybe mute and turn of camera. No need to be on camera/audio if not speaking. Just easier on those presenting and not needing the pressure of just sitting on camera if that person is not the focus at the time.
This went right over your head at the speed of light, didn't it? Lmao
Nice. Here is how you can acquire PCI DSS certification for a career boost. kzread.info/dash/bejne/ZomDtbiNgbPMecY.htmlsi=10MMKy1VkvZJzHQs
Nice. Here is how you can acquire PCI DSS certification for a career boost. kzread.info/dash/bejne/ZomDtbiNgbPMecY.htmlsi=10MMKy1VkvZJzHQs
That background music is most annoying and takes away from the learning experience.
slides were never sent out for this, is it possible to get a copy?
Hi Luddena, The presentation slides and recording have been distributed via email to all delegates that registered. In the event that you have not received them, you may access and download the slides for the webinar by visiting our website: www.itgovernance.co.uk/dora-compliance-and-what-it-means-for-the-financia Kind regards
I wonder how much money these “breaches” bring in for these companies?
Don't waste people's time! Zero quality!!
great quality info
Alan Calder...The Don....Cool Delivery.....
A lot of people failed at what you accomplished, simply because they were busy finding problems while you were busy finding solutions *GrindTechiei* . Every time you do a good job it reflects on how honest and kind you’re,, I won’t forget easily this recovery you did for me•
Very informative. Thanks for this.
I have mistakenly deleted the videos of Cyber security under a African person with related to Cyber security so l want to see again all this videos of 9+ hours Cyber security
I am interested of my government lndia lT department because long six years l am requesting to BJP government they are hacking my notes on micromaxQ382 of imei1-911567754510476 instead of helping me they stolen my phone they have my SBI account 33319782867 connecting with millions account but they doesn't give me a penny l want to recover my stolen phone and my data all and finalize a little money help me
Very clear! Thank you.
Thank you for the information!👍👍👍👍👍👍
the quality of sound is....bad...very bad