Channel Avatar

Rezky Wulandari @UC3Z6Aus0YnD6GgRWH-eKzKA@youtube.com

1.9K subscribers - no pronouns :c

More from this channel (soon)


07:25
1 Introduction
05:15
24 Prudent Person Rule
01:01
33 Data Collection GÇö Identify Assets
02:25
29 Defining Acceptable Levels
01:38
37 Data Collection GÇö Calculate Risks
06:35
25 Risk Management
01:03
35 Asset Value
03:18
42 Qualitative Risk Analysis
07:47
43 ARO Values
01:01
27 Planning Stage GÇö Analysis Method
01:04
18 Without Standards
01:14
13 What Security People Are Really Thinking
04:07
12 Social Engineering
00:39
45 Risk Types
00:53
30 Acceptable Risk Level
00:56
40 Qualitative Analysis Steps
02:01
23 Due Diligence and Due Care
00:44
38 Scenario Based GÇö Qualitative
01:34
34 Data Collection GÇö Assigning Values
02:05
26 Planning Stage GÇö Scope
00:41
39 Risk Approach
03:34
10 AIC Triad
03:39
20 Holistic Security
01:05
31 Collecting and Analyzing Data Methods
01:57
17 Open Standards
01:20
36 Data Collection GÇö Identify Threats
03:22
21 Different Types of Law
02:38
16 The Bad Guys Are Motivated
01:51
28 Risk Management Tools
01:01
14 Security Concepts
04:43
19 Controls
01:55
76 Information Technology Infrastructure Library
01:28
73 New ISO Standards
02:27
66 Silo Security Structure
00:57
64 Functional and Assurance Requirements
01:51
56 ManagementGÇÖs Response to Identified Risks
02:56
49 CostBenefit Analysis Countermeasure Criteria
01:09
58 Risk Analysis Process Summary
02:23
74 COBIT
00:29
75 Measurements
02:01
51 Controls II
01:21
55 Dealing with Risk
00:27
69 Result of Battling Management
00:50
59 Components of Security Program
01:11
72 Numbering
00:58
47 CostBenefit Analysis
00:52
61 In Security You Never Want Any Surprises
00:46
62 Building Foundation
01:22
48 Cost of a Countermeasure
01:01
50 Calculating CostBenefit
00:55
71 Pieces and Parts
04:14
65 Most Organizations
01:26
46 Losses
02:59
52 Quantitative Analysis
01:11
54 Uncertainty Analysis
01:07
67 Security Is a Process
01:43
57 Risk Acceptance
01:22
60 A Layered Approach
01:30
70 Industry Best Practices Standards
03:31
63 Security Roadmap