Curated Video
Risk Management for Cyber Security Managers - What Is Risk?
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.
Curated Video
Risk Management for Cyber Security Managers - What Is Vulnerability Management?
This lesson will discuss identifying, assessing, treating, and reporting security vulnerabilities.
Curated Video
Risk Management for Cyber Security Managers - Section Preview-3
In this video, you will learn more about the different vulnerabilities an organization can face and how to eliminate them as much as possible.
Curated Video
Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.
Curated Video
Risk Management for Cyber Security Managers - Risk Monitoring
In the final video of this section, we will discuss monitoring risks, how we can go about watching them, and if we can keep a close tab on risks with this process.
Curated Video
Risk Management for Cyber Security Managers - Section Preview-1
This video briefly outlines what you will learn in this section.
Curated Video
Risk Management for Cyber Security Managers - Risk Management as a Profession
In this video, the author discusses the pros and cons of risk management as a profession and how to go about it for those interested in this.
Curated Video
Risk Management for Cyber Security Managers - Introduction to the Course
This brief introductory video overviews the course and briefly outlines cyber risk management concepts.
Curated Video
What is the Riskiest Region in the US as the Climate Changes
Climate Change is increasing the frequency and severity of natural disasters all around the world. And in the United States, more and more people seem to be moving to the places that are projected to be most impacted by climate change,...
Curated Video
Genetic Modification
Genetic Modification allows scientists to manipulate the genetic information of cells, even swapping characteristics between different species. But it is a process which has caused a lot of controversy. Biology - Cells And DNA - Learning...
Curated Video
Frontier Oil Exploration
Dwindling oil supplies mean exploration drilling is moving to far-flung reaches of the Earth. What difficulties does this pose, and what could the environmental impacts be? Earth Science - Earth's Resources - Learning Points. In the USA,...
Curated Video
Natural Versus Artificial
Are all artificial chemicals bad for our health? Revealing the health implications of natural and artificial chemicals, and the natural chemicals which can be deadly. Chemistry - Chemical Industries - Learning Points. All matter consists...
Curated Video
Dangers of smoking
Warning: Contains footage of smoking. Why do so many people smoke when the risk to their health is so high? Life processes - Humans and other animals - Drug awareness Learning Points Smoking damages health. Smoking increases the...
Curated Video
The CISO Masterclass - Budgets-2
In this video, you will gain valuable insights into managing budgets in the context of cybersecurity strategy implementation and aligning financial resources effectively.
Curated Video
The Thrill of the Fall: Unpacking the Psychology of Bungee Jumping
Join a group of adventurous students as they confront their fears by bungee jumping from a 35-meter-high viaduct in Burgundy. This video explores the psychological aspects of thrill-seeking behaviors, revealing why people are drawn to...
Curated Video
Navigating Nature: Innovative Solutions for Flood and Landslide Risks
Explore the evolution of flood and landslide management in France, from the historic 1910 Paris flood to modern preventative measures. Discover how innovative engineering, like amphibious buildings and protective nets, safeguards...
Curated Video
Fundamentals of Secure Software - Risk Rating Introduction
This video provides an introduction to risk rating and what it is used for.
Curated Video
A Detailed Guide to the OWASP Top 10 - Section Intro
In this video, we introduce the focus on OWASP's Top 10 API Security Risks for 2023, setting the stage for deep dives into each risk.
Healthcare Triage
How Do Drugs Get Invented?
With support from the National Institute for Health Care Management, we’re spending the next three episodes talking about how drugs get approved in the United States. In this first episode, we discuss the drug approval process from the...
Healthcare Triage
Just Because a Drug is FDA Approved Doesn't Mean it Works
The drug approval process in the United States is complicated. There are many stakeholders and varying agendas when bringing a drug to market, and profit motives often are as big a factor as helping patients. The loopholes and shortcuts...
Curated Video
CISSP Crash Course - Business Continuity
This video explains business continuity and business continuity planning. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
ChatGPT and Prompt Engineering With Advanced Data Analysis - Potential Risks of ChatGPT
Explore the potential risks and ethical concerns of using ChatGPT and similar language generation models. We discuss issues such as bias, misinformation, privacy, and security, and how these risks can impact the use of ChatGPT in various...
Curated Video
Hamlet 3.1 “Lose the name of action”
This video provides a detailed exploration of Hamlet's reflections on action and inaction in Act 3, Scene 1, particularly his famous contemplation that overthinking diminishes our resolve and shifts our intended actions. It examines...