Channel Avatar

InfoSec Governance @UCSugWR3ZkieKYvo6YbL-OLA@youtube.com

1.1K subscribers - no pronouns :c

InfoSec Governance are an information security company based


07:08
What is Information Security Governance?
04:56
What is PESTLE Analysis? A quick overview
06:02
Security Boundaries: What are they and why do you need them?
05:31
Why the Digital Operational Resilience Act (DORA) matters for your business
09:28
The CIA Triad and information security: What is it and how can it help you?
04:41
PROTECT Your Business with These Five Essential Information Security Pillars!
02:40
How do you install and configure a firewall on Ubuntu in under 3 minutes?
07:25
What is the NIS2 Directive
01:20
What are the challenges of complying with NIS 2 directive. #nis2
01:43
How to install clamAV on Linux in under 2 minutes
08:22
What is Governance, Risk, compliance (GRC): An introduction
27:45
How to answer the Cyber Essentials questionnaire: A complete guide
07:50
What are the 8 CISSP domains
08:13
How to create a risk register in under 10 minutes
00:27
How to search for your Cyber Essentials certificate
06:55
Master Asset Management Policy Creation In Just 10 Minutes!
06:11
How to create an asset register in under 5 minutes
07:12
Cyber Essentials Basic vs Cyber Essentials Plus, what are they and which one should you get?
05:30
Asset management: Why do you need to do it?
02:00
Cyber Essentials Price increase coming - 1st April 2024
02:40
Cyber Essentials: Common problems with Operating systems
02:09
Firewalls: Do you need them? Are they important?
02:00
Five reasons why you should should have account separation
20:46
IASME Cyber Assurance Themes, what do you need to know?
06:01
The new IASME Cyber Baseline certification for international companies, what is it?
02:07
Windows Server 2012 is no more. Microsoft no longer support the Operating System.
05:21
Are you running as a local administrator? Stop! Watch this now.
07:12
Changes are coming, say hello to: IASME Cyber Assurance
05:58
3 reasons why your IT company should outsource their information security
15:40
Important changes to Cyber Essentials Scheme (24th January 2022)
26:09
ExcelPoint On Point Podcast with our director, Marcus Dempsey
03:04
Managing your assets: 3 easy ways
04:56
What is the Data Protection Act?
11:04
Ransomware: What is it? How do I recover from it
10:44
How safe is your WordPress?
03:59
What is the Computer Misuse Act?
11:38
Event Logging 101: Why you should be logging your events
09:23
Does your business document?
09:56
Decommissioning Policies - How to get started
08:13
Cyber Essentials Changes - 26th April 2021
09:35
Zero trust security model
07:00
What is Cyber Security?
06:49
Introduction to SOX compliance
05:25
Introduction to Information Security Governance
06:25
Nessus Credentialed Scan - Configuring GPO
07:36
Why you should perform a credentialed vulnerability scan
04:32
Exchange Server: Zero days - What you need to know
22:24
Beginners guide to Windows Security
04:03
What is IASME Governance?
02:29
How much is Cyber Essentials?
00:48
Who are InfoSec Governance?
03:28
Automate all things within the business, why you should be doing it!
10:25
Top 10 Cyber Security tips for your business
08:30
What is an internal audit and how do you perform them?
08:40
How to disable SSL 2, SSL3, TLS 1.0 and TLS 1.1 with Group Policy
08:37
Cyber Essentials: Malware protection and Software Patching
03:25
How to harden Remote Desktop (RDP) in under 3 minutes
14:06
Cyber Security and Governance, Risk and Compliance (GRC)
01:37
How to disable Sweet32 on Windows
01:32
Cyber Essentials: December 2020 Operating System update