Channel Avatar

Systemise @UCKLm1apr2ruXEE2PrhJETBw@youtube.com

63 subscribers - no pronouns :c

More from this channel (soon)


04:12
Safeguarding Your Systems: Intrusion Detection and Prevention Systems (IDS/IPS)
04:23
Risk Assessment in Information Security: Identifying and Mitigating Threats.
04:09
Ethical and Social Issues in Information Systems: A Guide for Responsible Technology Use
02:55
Security Assessment Report Template
03:57
Navigating the Data Landscape: Understanding Privacy Information Management Systems (PIMS).
04:12
Information Systems: The Backbone of Modern Organizations.
03:55
Making Informed Choices: A Guide to Information Systems for Decision Making (ISDM).
03:57
Navigating Your Business Landscape: A Guide to Executive Information Systems (EIS)
03:47
Fundamentals of Information Security: Building a Strong Foundation
04:07
The Ultimate Guide to Systemizing Your Business: Efficiency, Growth, and Freedom.
03:28
Implementing Effective Access Control in Information Security.
04:25
A Comprehensive Cybersecurity Audit Checklist
03:36
Building Your Knowledge Base: A Guide to Implementing a Knowledge Management System (KMS)
05:22
Information System Planning: A Step - by - Step Guide
02:36
Annex A.12.4.1 Event logging. - Checklist of# ISO/IEC 27001
02:37
Annex A.18.2.3 Technical compliance review - Checklist of# ISO/IEC 27001
02:49
Annex A.18.2.2 Compliance with security policies and standards. - Checklist of #ISO/IEC 27001
02:11
Annex A.18.2.1 Independent review of information security - Checklist of #ISO/IEC 27001
02:32
Annex A.18.1.5 Regulation of cryptographic controls - Checklist of# ISO/IEC 27001
02:09
Annex A.18.1.4 Privacy and protection of personally identifiable information - of #ISO/IEC 27001
02:51
Annex A.18.1.3 Protection of records - Checklist of# ISO/IEC 27001
02:14
Annex A.18.1.2 Intellectual property rights - Checklist of# ISO/IEC 27001
03:37
Annex A.18.1.1 Identification of applicable legislation and contractual requirements.#ISO/IEC 27001
02:37
Annex A.17.2.1 Availability of information processing facilities - Checklist of #ISO/IEC 27001
02:28
Annex A.17.1.3 Verify, review and evaluate information security continuity - Checklist of# ISO 27001
02:19
Annex A.17.1.2 Implementing information security continuity - Checklist of #ISO/IEC 27001
02:58
Annex A.17.1.1 Business continuity planning - Checklist of #ISO/IEC 27001
02:15
Annex A.16.1.7 Collection of evidence - Checklist of# ISO/IEC 27001
02:47
Annex A.9.2.6 Removal or adjustment of access rights - Checklist of# ISO/IEC 27001
02:51
Annex A.9.2.5 Review of user access rights - Checklist of #ISO/IEC 27001
02:50
Annex A.9.2.4 Management of secret authentication information of users - Checklist of #ISO/IEC 27001
02:49
Annex A.9.2.3 Management of privileged access rights - Checklist of# ISO/IEC 27001
02:02
Annex A.9.2.2 User access provisioning - Checklist of# ISO/IEC 27001
02:21
Annex A.9.2.1 User registration and de-registration - Checklist of ISO/IEC 27001
02:07
Annex A.9.1.2 Access to networks and network services - Checklist of ISO/IEC 27001
02:15
Annex A.9.1.1 Access control policy - Checklist of ISO/IEC 27001
02:01
Annex A.8.3.3 Physical media transfer - Checklist of# ISO/IEC 27001
02:12
Annex A.8.3.2 Disposal of media - Checklist of# ISO/IEC 27001
03:07
Annex A.16.1.6 Learning from information security incidents.- Checklist of #ISO/IEC 27001
01:57
Annex A.16.1.5 Response to information security incidents - Checklist of# ISO/IEC 27001
02:21
Annex A.16.1.4 Assessment of and decisions on information security events - Checklist of# ISO 27001
02:14
Annex A.16.1.3 Reporting information security weaknesses - Checklist of #ISO/IEC 27001
03:02
Annex A.16.1.2 Reporting information security events - Checklist of# ISO/IEC 27001
02:33
Annex A.16.1.1 Responsibilities and procedures - Checklist of #ISO/IEC 27001
03:35
Annex A.15.2.2 Managing changes to supplier services - Checklist of #ISO/IEC 27001
02:49
Annex A.15.2.1 Monitoring and review of supplier services - Checklist of# ISO/IEC 27001
02:41
A.15.1.3 Information and communication technology supply chain - Checklist of #ISO/IEC 27001
04:55
Annex A.15.1.2 Addressing security within supplier agreements - Checklist of# ISO/IEC 27001
03:52
Annex A.15.1.1 Information security policy for supplier relationships - Checklist of #ISO/IEC 27001
02:27
Annex A.14.3.1 Protection of test data - Checklist of# ISO/IEC 27001
03:07
Annex A.14.2.9 System acceptance testing -Checklist of# ISO/IEC 27001
02:28
Annex A.14.2.8 System security testing - Checklist of #ISO/IEC 27001
03:01
Annex A.14.2.7 Outsourced development - Checklist of #ISO/IEC 27001
02:43
Annex A.14.2.6 Secure development environment -Checklist of ISO/IEC 27001
02:14
Annex A.14.2.5 Secure system engineering principles -Checklist of #ISO/IEC 27001
01:46
Annex A.14.2.4 Restrictions on changes to software packages - Checklist of #ISO/IEC 27001
02:36
A.14.2.3 Technical review of applications after operating platform changes Checklist of# ISO 27001
02:05
Annex A.14.2.2 System change control procedures - Checklist of# ISO/IEC 27001
02:07
Annex A.14.2.1 Secure development policy - Checklist of# ISO/IEC 27001
01:54
Annex A.14.1.3 Protecting application services transactions - Checklist of# ISO/IEC 27001