Instructional Video4:50
Curated Video

Risk Treatment and Residual Risks

Higher Ed
The basic methods for risk management—avoidance, retention, sharing, transferring, and loss prevention and reduction
Instructional Video1:18
Curated Video

Definitions

Higher Ed
The video introduces various terminology used in risk management
Instructional Video10:57
Curated Video

Types of project risks and how to prepare a contingency plan

Higher Ed
This video discusses types of project management and the importance of preparing a contingency plan for business projects. The video explains the various risks associated with business projects, including budget, schedule, and...
Instructional Video7:45
Curated Video

Strategic Thinking Skills for a Leader

Higher Ed
In this video, we explore the importance of strategic thinking skills for leaders and how they can be developed. We discuss the six primary skills of strategic learning, the benefits of strategic thinking, and provide tips on how to...
Instructional Video8:02
Curated Video

GDPR Cloud Storage Requirements

Higher Ed
This section will provide you with information about the enforcement of GDPR and the significant implications on cloud service providers and their businesses including their implementation of operations and security control mechanisms.
Instructional Video2:07
Curated Video

DPO Tasks

Higher Ed
This section provides information on the main governance and technical tasks to be delivered by the DPO
Instructional Video6:54
Curated Video

Contingency Plan: Having a Plan B

Higher Ed
In this video, viewers will learn about contingency planning, which is a strategy designed to mitigate risks that may arise during a project. The video explains the four essential steps involved in developing an effective contingency...
Instructional Video12:41
Curated Video

How to Prepare and Present Your Report final mp4 new

Higher Ed
This video will teach you how to professionally present your findings to a client
Instructional Video1:04
Curated Video

The Big Picture

Higher Ed
The video presents the big picture of risk management along with introducing a dashboard that can be adopted by businesses to monitor their risk thresholds
Instructional Video0:55
Curated Video

I WONDER - What Is Online Safety?

Pre-K - 5th
This video is answering the question of what is online safety.
Instructional Video3:49
Let's Tute

5 Tips to Boost Your Creative Thinking

9th - Higher Ed
This video provides tips for developing creativity, including taking risks, using the six hats technique, seeking advice, looking for creativity around you, and walking to boost creative thinking. It emphasizes the importance of thinking...
Instructional Video25:03
Curated Video

How can ISO 27005:2022 support your ISMS certification

Higher Ed
In this video, we will explore how ISO 27005:2022 can support your ISMS certification. ISO 27005:2022 is a risk management standard that provides guidelines for information security risk management. By implementing ISO 27005:2022, you...
Instructional Video2:31
Curated Video

Data leakage prevention control

Higher Ed
In this video, we will be discussing data leakage prevention control. Data leakage is a serious concern for businesses of all sizes, as it can lead to the loss of sensitive information, financial loss, and damage to a company's...
Instructional Video1:16
Curated Video

Planning Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Planning Domain of ISO 27001, which is a globally recognized standard for information security management. The Planning Domain is the first step in implementing an effective information security...
Instructional Video17:40
Curated Video

Setting up an ISMS in ISO 27001

Higher Ed
In this video, we will guide you through the process of setting up an Information Security Management System (ISMS) in accordance with the ISO 27001 standard. We will cover the key steps involved in establishing an effective ISMS,...
Instructional Video4:43
Curated Video

iPhone Hacking Tools

Higher Ed
In this video, we will be discussing iPhone hacking tools. We will explore the different types of tools that are available for hacking iPhones, including software and hardware tools. We will also discuss the risks and benefits of using...
Instructional Video8:57
Curated Video

iPhone Jailbroken Devices

Higher Ed
In this video, we'll be discussing iPhone jailbroken devices. If you're not familiar with jailbreaking, it's the process of removing software restrictions imposed by Apple on their iOS operating system. This allows users to customize...
Instructional Video12:44
Institute of Human Anatomy

The Anatomy and Function of the Frontal Cortex

Higher Ed
In this video, the anatomy and functions of the frontal cortex are explained. It is revealed that the frontal cortex, responsible for motor control and executive functions, doesn't fully develop until the age of 25. The video also...
Instructional Video1:31
Sustainable Business Consulting

Good Sustainable Strategy is Good Business Strategy

Higher Ed
Learn how sustainable strategy allows businesses to place themselves in a better position with their customers, employees, shareholders and other stakeholders.
Instructional Video1:57
The Business Professor

What is Micro-Marketing

Higher Ed
What is Micro-Marketing
Instructional Video4:29
Sustainable Business Consulting

Resiliency in Reporting and the CDP

Higher Ed
Description of current trends in sustainability reporting and a look into CDP disclosure questions
Instructional Video16:18
Institute for New Economic Thinking

J. Doyne Farmer - Networks and Systemic Risks

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risks
Instructional Video5:06
Sustainable Business Consulting

CDP Submission Case Studies

Higher Ed
Discusses the success of four companies in the answers they provided and business value they generated
Instructional Video5:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments

Higher Ed
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents. This clip...