Cybersecurity Risk Assessment (Easy Step by Step)

Sdílet
Vložit
  • čas přidán 28. 08. 2024
  • In this video, we show you step by step how to conduct a security risk assessment for your organization.
    It is important that you can assess risks and their associated impacts so that you can prioritize your security efforts where they are really needed.

Komentáře • 20

  • @kithdhasengh2013
    @kithdhasengh2013 Před rokem +5

    Thanks for uploading. This is a great REAL LIFE example of a risk assessment.

  • @thandekambonambi8885
    @thandekambonambi8885 Před 28 dny +1

    Thanks this is very useful

  • @olaiyaolubunmi2679
    @olaiyaolubunmi2679 Před 11 měsíci +3

    This has been so helpful, I am new to the cyber space, and have a job assessment coming up, this has really helped me, thank you!

  • @skippy5311
    @skippy5311 Před měsícem

    This video has a lot of great information for outlining the process of cybersecurity risk assessment. The sound FX and graphics are distracting/superfluous in the beginning. Steps are well marked with chapter graphic transitions at the start, but by the end there are no transitions. Also, the naming and order of many steps is inconsistent with the listing presented at the top of the video. Regardless, the video is a good introduction to the topic.

  • @rightscent
    @rightscent Před 4 měsíci +1

    Thank you, you provided great example

  • @Risklearner
    @Risklearner Před 6 měsíci +1

    Thanks. It was really helpful!

  • @scottiejackson5710
    @scottiejackson5710 Před rokem +3

    0:39 great video! I am new IT consulting. How can get a hard copy of those 9 steps of your Cybersecurity Risk Assessment?

  • @romeoowusuagyemangagyemang6764

    Very great informative content. Thank you 🙏

  • @emediongdestiny
    @emediongdestiny Před 6 měsíci +1

    i would love to have practical videos

  • @jackieo7113
    @jackieo7113 Před 9 měsíci +1

    Very helpful

  • @AmmaBoakyiwaa-vu3gn
    @AmmaBoakyiwaa-vu3gn Před 8 měsíci

    Thank you so much for this video.

  • @cyberja
    @cyberja Před 8 měsíci

    I love your presentation. Id love to have a conversation with you on the cyberja livestream.

  • @TekGhimire-km4xx
    @TekGhimire-km4xx Před 10 měsíci +3

    I cant seem to find nist threat catalog. Would you be able to provide link to nist threat catalog please?

    • @terohann
      @terohann Před 10 měsíci +2

      Perhaps he's referring to the NIST SP 800-30, annex D and E.

    • @theinfosecacademy
      @theinfosecacademy  Před 10 měsíci +2

      It's an Annex inside of the NIST Risk Assessment Methodology. 800-30

  • @JurOz1980
    @JurOz1980 Před rokem +1

    Thx!

  • @noblenoble584
    @noblenoble584 Před 8 měsíci

    Thanks

  • @Vision06
    @Vision06 Před 3 měsíci +1

    I am thankful but lazy - would have loved to find these infos in text form 🙂

  • @IamOnlyaHumanafterall
    @IamOnlyaHumanafterall Před 4 měsíci

    Thank you very much; this is a great video. Can you share your email, as I have few doubts ?