Instructional Video4:48
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Monitoring and Control

Higher Ed
This video explains monitoring and control. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and control.
Instructional Video5:55
Curated Video

Maximizing Business Potential with Chat GPT: Marketing and Sales Hacks

12th - Higher Ed
In this lesson, we will explore the impact of Chat GPT in the business world, specifically in marketing and sales. We will demonstrate how Chat GPT can help summarize long product descriptions, provide keywords for SEO, generate longer...
Instructional Video2:31
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Welcome to the Course

Higher Ed
This video explains the course overview. This clip is from the chapter "Course Introduction" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section introduces you to the course.
Instructional Video1:49
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Understanding Security Controls

Higher Ed
This video explains understanding security controls. This clip is from the chapter "Risk Responses and Controls" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk responses and controls.
Instructional Video6:47
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - IT Security Assessments

Higher Ed
This video explains IT security assessments. This clip is from the chapter "Risk Identification" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to identify risk.
Instructional Video2:58
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Instructor Introduction

Higher Ed
This video introduces you to the instructor of the course. This clip is from the chapter "Course Introduction" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section introduces you to the course.
Instructional Video2:36
IDG TECHtalk

Congress addresses SolarWinds attack, Biden’s cybersecurity plan

Higher Ed
While the federal government and businesses continue to reel from the SolarWinds attack, members of Congress have begun proposing cybersecurity measures to better strengthen the United States against foreign cyber attacks. In this...
Instructional Video4:57
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Tangible and Intangible Assets

Higher Ed
This video explains tangible and intangible assets. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video4:12
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Higher Ed
This video explains a deeper dive look at IT vulnerabilities. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for...
Instructional Video3:20
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Common IT Vulnerabilities

Higher Ed
This video explains common IT vulnerabilities. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video1:12
Next Animation Studio

China turns ‘Great Cannon’ on Hong Kong web forum

12th - Higher Ed
A Chinese cyberweapon dubbed the Great Cannon is launching DDoS attacks on a Hong Kong webform after years of silence, AT&T Cybersecurity reported on Wednesday.
Instructional Video34:41
The Wall Street Journal

Where to Start in Understanding Your Cyber Risk

Higher Ed
How the latest cyber risks affect your business and how to use that knowledge to start planning a cyber-defense strategy.
Instructional Video11:28
Flame Media

Real Future: Hackers

12th - Higher Ed
As companies like Ashley Madison and celebrities like Jennifer Lawrence have learned, being hacked can have devastating consequences. But how bad can it get? Our host decides to find out by inviting two of the world's most elite hackers...
Instructional Video4:39
National Institute of Standards and Technology

Cybersecurity Framework Overview Michael Daniel

9th - 12th
White House Cybersecurity Coordinator Michael Daniel describes the Cybersecurity Executive order as industry and government sharing information to raise the baseline of cybersecurity across U.S. businesses and critical infrastructure.
Instructional Video12:13
The Wall Street Journal

Compliance Officer Survey

Higher Ed
The Wall Street Journal’s Tom Corrigan reveals the results of the Journal’s third annual compliance officer survey, including where compliance officers see the greatest risks and how they see their role and resources changing.
Instructional Video9:58
Curated Video

Shutdown Any WiFi Network

Higher Ed
In this tutorial, you will learn how to jam nearby WiFi signals and how disconnect authenticated users from them.
Instructional Video2:02
National Institute of Standards and Technology

Introducing Phish Scale - Rating Human Phishing Detection Difficulty

9th - 12th
If your employees are online, they – and, by extension, your organization – are a target for phishing. Enter the phish scale. Created by NIST researchers using real data, this scale allows you to evaluate the quality and sophistication...
News Clip3:46
Curated Video

How fraudsters are stealing millions from Canadian taxpayers

9th - Higher Ed
New ReviewFraudsters have found a way to exploit vulnerabilities in the Canada Revenue Agency, using stolen personal data and a side-door entry to steal millions from the public purse, and leaving victimized Canadians holding the bag.
News Clip2:03
Curated Video

Victim out $10K questions why Anti-Scam Coalition doesn’t help with refunds

9th - Higher Ed
New ReviewA new Canadian Anti-Scam Coalition that includes telcos, police and major banks has pledged to fight financial fraud, but the coalition's efforts don’t include providing refunds to people who fall for a scam, something victims and...
News Clip2:03
Curated Video

TD scam victim out $10K questions why Anti-Scam Coalition doesn't address refunds

9th - Higher Ed
New ReviewA new Canadian Anti-Scam Coalition that includes telcos, police and major banks has pledged to fight financial fraud, but the coalition's efforts don’t include providing refunds to people who fall for a scam, something victims and...
News Clip0:36
Curated Video

CyberArk Software Acquired by Palo Alto Networks for $25B

9th - Higher Ed
Palo Alto Networks, a cybersecurity firm based in California, has agreed to acquire Israeli company CyberArk Software in a deal valued at roughly $25 billion.
News Clip23:32
Curated Video

Go Fund Yourself: Tech that Travels

9th - Higher Ed
XOOX is turning backpacks into portable entertainment hubs, while CyFireAI helps small businesses stay ahead of cyber threats.
News Clip2:21
Curated Video

Here's who can actually ask for your SIN

9th - Higher Ed
Cybersecurity expert Claudiu Popa shares his tips for keeping your social insurance number safe. He says it starts with just saying no to most companies and organizations that request it.
News Clip2:01
Curated Video

Implications of LifeLabs data breach

9th - Higher Ed
Millions of Canadians had their data stolen in a cyberattack at LifeLabs. The National looks at why that information would be in demand — and what might be done with it.