Kyber Security
Kyber Security
  • 107
  • 123 270

Video

Top 10 Questions about CMMC
zhlédnutí 16Před měsícem
Top 10 Questions about CMMC
Is Anyone Going To Steal My Data?
zhlédnutí 7Před měsícem
Is Anyone Going To Steal My Data?
What Are The Top Challenges To Becoming CMMC Compliant?
zhlédnutí 4Před měsícem
What Are The Top Challenges To Becoming CMMC Compliant?
What Happens When a Server Fails?
zhlédnutí 7Před měsícem
What Happens When a Server Fails?
Is It Ok To Save Passwords In A Browser?
zhlédnutí 6Před měsícem
Is It Ok To Save Passwords In A Browser?
How Long Does It Take To Become CMMC Compliant?
zhlédnutí 10Před měsícem
How Long Does It Take To Become CMMC Compliant?
How Much Does It Cost To Be CMMC Compliant?
zhlédnutí 16Před měsícem
How Much Does It Cost To Be CMMC Compliant?
What Does the Gap Assessment Process Look Like?
zhlédnutí 4Před měsícem
What Does the Gap Assessment Process Look Like?
What is CMMC?
zhlédnutí 4Před měsícem
What is CMMC?
How Can I Afford To Become CMMC Compliant?
zhlédnutí 4Před měsícem
How Can I Afford To Become CMMC Compliant?
Do I Need To Back Up My Cloud Data?
zhlédnutí 4Před měsícem
Do I Need To Back Up My Cloud Data?
What is Vulnerability Scanning?
zhlédnutí 11Před měsícem
What is Vulnerability Scanning?
What is a SSP?
zhlédnutí 2Před měsícem
What is a SSP?
What is a POAM?
zhlédnutí 7Před měsícem
What is a POAM?
What If I Do Not Comply With CMMC?
zhlédnutí 5Před měsícem
What If I Do Not Comply With CMMC?
What is FCI and CUI?
zhlédnutí 9Před měsícem
What is FCI and CUI?
Does My MSP Already Take Care of Cybersecurity?
zhlédnutí 6Před 3 měsíci
Does My MSP Already Take Care of Cybersecurity?
How Can Reputation Damage Affect An Organization?
zhlédnutí 9Před 3 měsíci
How Can Reputation Damage Affect An Organization?
Can an MSSP Handle Day-to-Day Issues?
zhlédnutí 15Před 3 měsíci
Can an MSSP Handle Day-to-Day Issues?
What is a Master Services Agreement (MSA)?
zhlédnutí 75Před 3 měsíci
What is a Master Services Agreement (MSA)?
What is Defense in Depth?
zhlédnutí 6Před 3 měsíci
What is Defense in Depth?
What is Cybersecurity?
zhlédnutí 11Před 3 měsíci
What is Cybersecurity?
What is the NIST Cybersecurity Framework?
zhlédnutí 11Před 3 měsíci
What is the NIST Cybersecurity Framework?
What Things Should I Prepare Before Making An MSP Change?
zhlédnutí 5Před 3 měsíci
What Things Should I Prepare Before Making An MSP Change?
Why Is Cyber Awareness Training Important?
zhlédnutí 4Před 3 měsíci
Why Is Cyber Awareness Training Important?
How Much Does It Cost to Secure My Company?
zhlédnutí 16Před 3 měsíci
How Much Does It Cost to Secure My Company?
Is CMMC Important For My Organization
zhlédnutí 20Před 6 měsíci
Is CMMC Important For My Organization
How Long Does It Take To Become CMMC Compliant?
zhlédnutí 17Před 6 měsíci
How Long Does It Take To Become CMMC Compliant?
Does My Organization Need to Be CMMC Compliant?
zhlédnutí 13Před 6 měsíci
Does My Organization Need to Be CMMC Compliant?

Komentáře

  • @jann9507
    @jann9507 Před 4 měsíci

    Disjointed talk…. Wasn’t clear on the objective nor the solution

  • @brandonchoquette691
    @brandonchoquette691 Před 8 měsíci

    Great information! Thanks as always Michael and Bob :)

  • @thaliagerardo3477
    @thaliagerardo3477 Před 11 měsíci

    Promo-SM 😒

  • @kentrelc1
    @kentrelc1 Před rokem

    Great presentation !

  • @user-cn8ps6pm5s
    @user-cn8ps6pm5s Před rokem

    THANK YOOUUUU

  • @ThunderGreens
    @ThunderGreens Před rokem

    This really helps

  • @jii8271
    @jii8271 Před rokem

    Promo*SM

  • @devspice
    @devspice Před rokem

    Excellent presentation.

  • @bigqdone
    @bigqdone Před rokem

    Awesome summary thanks!

  • @DelandaBaudLacanian

    What is a good certificate for a lowly programmer to get to get into cybersecurity?

  • @nash1072
    @nash1072 Před rokem

    🔥 PЯӨMӨƧM

  • @TechViking
    @TechViking Před rokem

    Do you have any tricks to lock Idenfity Protect detect respond recover to memory

  • @humoroustumorous6642

    Thank you so much for this video. I’m just getting into GRC and trying to learn as much as I can. This was very enlightening.

  • @apstech4618
    @apstech4618 Před 2 lety

    If the Navy owns a submarine, and they put it in drydock, they pay the dockmaster the rent. Or they own the dock outright. Right? When the Air Force stores a jet fighter, they pay rent, or they buy the hangar. Right? In no-case does the Navy or Air Force ever tell the property owner, "give us the storage and security for free, and pay all your own associated costs, and maybe we'll give you a contract in the future if you do" Right? To be perfectly clear: The DOD OWNS their own CUI. To then try to push both the responsibility and costs on storage and handling to third parties (Primes and Subs), while expecting their "landlords" to eat the costs upon a promise of a potential contract later, is just not workable. If the Federal Government wants to carry out its "Constitutionally Mandated obligations to secure the Nation", then it must understand that fact that it owns the CUI, and it dictates the controls and storage of CUI, and then it will pay to have those controls and storage implemented for It's CUI. None of the CMMC Regulation for Accountability makes any sense because the DOD is obviously trying to offload National Security back onto the people they are taxing and tasked with securing. The CMMC boondoggle IS the equivalent of telling companies to hire their own consultants to figure out ways to defend their airspace with homemade anti-aircraft missiles. National defense IS the sole province of the Federal Government. It cannot be shrugged-off back onto the people the government is supposed to be defending. It's obvious that The DOD wants to do cybersecurity on the cheap and line their pockets and their nepotist-crony's coffers, so it can keep awarding huge contracts to legacy defense contractors, who are their big political donors (PACs). Anyone who doesn't see this is a fool. Anyone who won't admit it is an accessory. Critical Thinkers will prevail, but don't expect the little guys to eat these costs. The Costs for this will be baked into everything you submit a PO for -or- DiB Subs will just stop doing business with the Federal Government. Round and Round... Back to the drawing board.

  • @Meruda05
    @Meruda05 Před 2 lety

    huzhu

  • @Meruda05
    @Meruda05 Před 2 lety

    eh

  • @zuowang5481
    @zuowang5481 Před 2 lety

    Isn't this NIST framework just an empty talk/common sense?

  • @beansprout_apg886
    @beansprout_apg886 Před 2 lety

    Thank you so much.

  • @jackieo7113
    @jackieo7113 Před 2 lety

    Hello - this was quite informative - are you able to post the entire session?

  • @cyberprofessional9834

    great presentation

  • @johnsonroy7233
    @johnsonroy7233 Před 2 lety

    Can you please show how to crack or bypass Think-Cell software license key

  • @jaikisan3393
    @jaikisan3393 Před 3 lety

    Super.. Every thing summed up nicely for quick learning

  • @digitalinnovationtechs8

    Thanks. Your video was very explainful!

  • @sousosisi316
    @sousosisi316 Před 3 lety

    Work net detect identity key security energical connect web from pc

  • @ITHunt-
    @ITHunt- Před 3 lety

    Nice course thank you

  • @rithwiks
    @rithwiks Před 3 lety

    Very Nice. Wish you to catch up with the presenter

  • @niral.shakya
    @niral.shakya Před 3 lety

    Genius.. Explained the 5 function the simple and best way...

  • @TanujPandey18
    @TanujPandey18 Před 3 lety

    Simple and easy to grasp!

  • @johnwood9375
    @johnwood9375 Před 3 lety

    Empirestore11 on Telegram is the right plug for your cc and dumps.. I just got my valid and working cc from him.... He's good and trustworthy ❤️✅

  • @watchmine5531
    @watchmine5531 Před 3 lety

    There might be fake ones out there but real one do exist contact @Darknills on *telegram* he is the real vendor, I got my cc with high balance from him yesterday 🙏

  • @rumildaolik4905
    @rumildaolik4905 Před 3 lety

    thanks

  • @ifeanyiok8916
    @ifeanyiok8916 Před 4 lety

    Great summary. Thank you

  • @TheOrlowskiObjective
    @TheOrlowskiObjective Před 4 lety

    The problem is that this nonsense hour is too long to bring any validation to a process, that is a psy ops reality gone wild. Not a psychological but psychotic operational clusterfuck. Do I have to sing to the choir? A GooTube random algorithm generating, artificial intelligence? military sand box that needs cleaning, replacing..upgrading? 2 years..2 months..2 days..2 hours..2 min. 2 sec..2 anything before...the gap..bitch. More like the 12 year media time loop. 1963.. Camelot's last virtual staff ride... and 1975..Geraldo..I will work in front of a green screen forever and never know it, 'America Tonight' the Zapruder film gets shown publicly for the first time. Then becomes the standard looped video proof..of the event? Nancy Pelosi says for the cameras, we must pass Obama Care in order to be able to read it." Both 12 year time loops need patching before the kids...go out to play. If I have to do it all myself...oh please let me...as if I need help or permission... ....12 hours from this time stamp..proof of profanity and less...will be moar.~

  • @TheOrlowskiObjective
    @TheOrlowskiObjective Před 4 lety

    If the dark web did not exist it would have to be invented. The same way you would allow me to sell you a $5 pillow for $85.

  • @macshild
    @macshild Před 4 lety

    IF you follow the NIST Framework to the letter, will that severely reduce gap towards GDPR and HIPAA and compliance?