Channel Avatar

ISSP @UCrnQPrsQZT1FVP6lbwdHqmw@youtube.com

288 subscribers - no pronouns :c

'ISSP has become the go-to firm for victims of Ukraine's cyb


24:52
Unlocking the future of cybersecurity: Exploring AIRA assessment platform – interview
24:47
Кібезбезпека бізнесу під час війни. Що варто усвідомлювати власникам МСБ?
02:25
ISSP Security Operations Center
25:59
Сучасний SOC для онлайн банкінгу: протидія шахрайству та виконання вимог НБУ
00:49
Innovations in Antifraud Solutions: A Glimpse into SOC Day with ISSP
11:55
Understanding Pentests: Essential Tips for Business Leaders with No Cybersecurity Background
07:17
Top 5 cybersecurity mistakes made by small business
18:40
Як правильно підготувати резюме фахівця з кібербезпеки
16:48
Якою має бути стратегія пошуку роботи в кібербезпеці
31:15
Як правильно підготуватися до співбесіди у IT та кіберкомпанію
09:59
Чому важливо розвивати у собі клієнтоорієнтованість
07:56
Як правильно комунікувати з командою і чому це важливо
05:10
Episode 12: Capacity Management - Bad IT Planning Could Lead To Cybersecurity Issues
01:48
INTRO: Welcome to Cybersecurity Practical Workshop for SME Leaders!
05:05
Episode 11: Test Your Security - Pentest, Compromise Assessment, Code Review
05:24
Episode 10: Cybersecurity Audit As An Essential Tool For Keeping Things Rolling
05:20
Episode 9: Don’t Blindly Trust Your Providers And Partners Cybersecurity - Check Suppliers Security
08:12
Episode 8: Security Operations Center As Your NASA Control Center
05:22
Episode 7: Cybersecurity Controls – A Set Of Measures, Which Mitigate The Risk
06:19
Episode 6: Framework As A Mindmap Of Your Cybersecurity
06:28
Episode 5: Risk Assessment Will Show How You Need To Protect Your Assets
04:33
Episode 4: Asset management helps to know what should be protected from cyber threats
05:34
Episode 3: Cybersecurity Regulations And Laws - What You Need To Consider Before You Start
06:07
Episode 2: Cyber Awareness - Keep informed, inform your employee – your first human firewall
10:28
Episode 1: What small business needs to know about cybersecurity?
10:33
Міжнародна Кібер Академія долучається до європейського проєкту DISCO
07:34
Ending the War in Ukraine – Information Battlefield |Oleh Derevianko| ISSP
01:29
Why Ukraine was the perfect victim for russian state-sponsored attacks | Oleh Derevianko| ISSP
01:10:14
Все, що потрібно знати про кібербезпеку за 60 хв | Роман Сологуб | ISSP
20:29
On the Frontlines of Fighting Cyber Attacks | Oleh Derevianko at CYBERSECURITY Luxembourg conference
00:45
Cybersecurity - Cyberattacks as a tool of psychological operations | Oleh Derevianko| ISSP
03:45
Cybersecurity is a never-ending game of improving processes and upskilling people | Oleh Derevianko
00:59
Why cybersecurity by design should be implemented in all startup activities? Oleh Derevianko| ISSP
35:01
Lessons from Ukraine for Canada's National Digital Strategy
01:01:43
Threat monitoring and access management. Key elements of an effective OT cybersecurity strategy
01:39
Cybersecurity - Is there still such thing as an insider threat? Roman Sologub | ISSP
01:20
Cybersecurity - How Ukraine improved after NotPetya | Roman Sologub | ISSP
01:02
Cybersecurity - SIEM vs Compromise Assessment - understand the difference | Artem Mykhailov | ISSP
00:40
Cybersecurity - Assume Compromise | Artem Mykhailov | ISSP
00:37
Cybersecurity - Protect your identity | Roman Sologub | ISSP
01:04:56
How is Ukraine defending itself against cyberattacks during the Russian invasion?
03:11
About ISSP Security Operations Center (SOC)
07:54
ArcSight Integration as Information Security, Antifraud, Anti Money Laundering solutions at FUIB
21:23
ISSP Chairman Interview to Crime Stoppers International
05:46
Сергій Поята розповідає як ISSP бореться з фінансовими злодіями
21:40
Breaking News: Ukrainian Power Grid Hack
03:23
McAfee One Time Password
04:59
«Положить» любой сайт не представляет труда
05:25
Email Security with Gemalto
15:00
McAfee VirusScan Enterprise 8.8
05:24
McAfee Host Intrusion Prevention System - Часть 2
12:21
McAfee Host Intrusion Prevention System - Часть 1
10:01
McAfee Device Control
06:24
McAfee ePolicy Orchestrator - Часть 2
14:26
McAfee ePolicy Orchestrator - Часть 1