Instructional Video17:40
Curated Video

Setting up an ISMS in ISO 27001

Higher Ed
In this video, we will guide you through the process of setting up an Information Security Management System (ISMS) in accordance with the ISO 27001 standard. We will cover the key steps involved in establishing an effective ISMS,...
Instructional Video4:43
Curated Video

iPhone Hacking Tools

Higher Ed
In this video, we will be discussing iPhone hacking tools. We will explore the different types of tools that are available for hacking iPhones, including software and hardware tools. We will also discuss the risks and benefits of using...
Instructional Video8:57
Curated Video

iPhone Jailbroken Devices

Higher Ed
In this video, we'll be discussing iPhone jailbroken devices. If you're not familiar with jailbreaking, it's the process of removing software restrictions imposed by Apple on their iOS operating system. This allows users to customize...
Instructional Video12:44
Institute of Human Anatomy

The Anatomy and Function of the Frontal Cortex

Higher Ed
In this video, the anatomy and functions of the frontal cortex are explained. It is revealed that the frontal cortex, responsible for motor control and executive functions, doesn't fully develop until the age of 25. The video also...
Instructional Video1:31
Sustainable Business Consulting

Good Sustainable Strategy is Good Business Strategy

Higher Ed
Learn how sustainable strategy allows businesses to place themselves in a better position with their customers, employees, shareholders and other stakeholders.
Instructional Video1:57
The Business Professor

What is Micro-Marketing

Higher Ed
What is Micro-Marketing
Instructional Video4:29
Sustainable Business Consulting

Resiliency in Reporting and the CDP

Higher Ed
Description of current trends in sustainability reporting and a look into CDP disclosure questions
Instructional Video16:18
Institute for New Economic Thinking

J. Doyne Farmer - Networks and Systemic Risks

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risks
Instructional Video5:06
Sustainable Business Consulting

CDP Submission Case Studies

Higher Ed
Discusses the success of four companies in the answers they provided and business value they generated
Instructional Video5:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments

Higher Ed
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents. This clip...
Instructional Video20:26
Institute for New Economic Thinking

In Defense of Human Judgment: An Interview with Amar Bhidé

Higher Ed
INET's complete interview with Amar Bhidé, the author of the recent book "A Call for Judgment." Chapters View all Fallacies of Finance 0:13 Replacing Judgment With Models 6:06 Systemic Regulatory Failures 10:09 A Categorical Breakdown...
Instructional Video10:29
Seven Dimensions

Ways to Enhance your Career

Higher Ed
In this video, Judy Olian, Dean of the UCLA Anderson School of Management, shares valuable insights on how to advance in one's career. She emphasizes the importance of saying yes to new assignments and taking risks, even when feeling...
Instructional Video21:56
Institute for New Economic Thinking

Globalized Finance and the Crisis of 2008

Higher Ed
The world economy is just starting to recover from the most disastrous episode in the history of financial globalisation. Understanding what happened is essential. Anton Brender and Florence Pisani, both economists teaching at...
Instructional Video3:33
Sustainable Business Consulting

The CDP Disclosure Framework

Higher Ed
Provides detailed descriptions of the CDP Reporting Framework
Instructional Video9:18
National Institute of Standards and Technology

Information Technology Security For Small Business

9th - 12th
Gives small business owners a glimpse into the resources from NIST, SBA, and the FBI that will help protect them from cyber crime. The video describes computer hacking, denial-of-service, laptop theft, insider abuse, computer viruses,...
Instructional Video5:25
The Business Professor

General Structure of an Insurance Contract

Higher Ed
General Structure of an Insurance Contract
Instructional Video5:51
Healthcare Triage

Blood Clots, FDA Approval, and the AstraZeneca Covid Vaccine

Higher Ed
There’s a lot of anxiety about the AstraZeneca vaccine thanks to recent reports of incomplete data, as well as reports on blood clot risks. Let’s take a look at both issues in context, understanding the efficacy data before and after...
Instructional Video21:17
Institute for New Economic Thinking

Robert Skidelsky - Interpreting the Great Depression: Hayek versus Keynes

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 1 - Dinner. 1930 and the Challenge of the Depression for Economic Thinking: Friedrich Hayek versus John Maynard Keynes
Instructional Video5:17
PBS

The Ugly Truth About Airline Miles

12th - Higher Ed
That "free" vacation might be costing you a lot more than you think...
Instructional Video26:54
The Wall Street Journal

Investor Expectations for a Net Zero Future

Higher Ed
Executives from Ceres, Neuberger Berman and TCI Fund Management discuss how they expect CFOs to articulate a clear path towards long-term net zero emission goals.
Instructional Video5:24
Healthcare Triage

Overestimation of Benefit

Higher Ed
In previous episodes of Healthcare Triage, we've discussed how people often misunderstand risk and how it affects them. We've also talked about how you can calculate the explicit metrics of numbers needed to treat and harm. But people...
Instructional Video7:22
National Institute of Standards and Technology

Cybersecurity Framework Workshop Rebecca Blank

9th - 12th
Commerce Deputy Secretary Rebecca Blank calls for industry to work with NIST in partnership to develop a voluntary framework that will promote best practices at critical infrastructure facilities and businesses to keep the U.S. safe.
Instructional Video7:54
National Institute of Standards and Technology

What is the Internet of Things (IoT) and how can we secure it?

9th - 12th
Industry leaders discuss cybersecurity concerns around the Internet of Things (IoT) and the role NIST (https://go.usa.gov/xPzuY) can play to help secure our future. Featuring thought leaders from: Global Cyber Alliance Symantec Cisco...
Instructional Video9:58
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting

Higher Ed
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 -...