This is one of the best explanations and overviews I have seen. Not that there arent others but this is the best I have found and it helps tremendously. I like how the role is broken down and it is explained that can be beneficial to current CISOs and not just virtual ones. Benard is to be commended for his efforts.
@parth96985 ай бұрын
helpful topic
@networkengineerinjapan6 ай бұрын
Awesome contents!!!
@qutaibabs18 ай бұрын
Nice. However, its totally driven from compalince frameworks and risk assessment. we should have another input which are Internal and external context using : SWOT, PESTEL, List of requirements and needs of the stakeholders. business goals and strategy so we build completely solid business driven cyber security goals and the needed initiatives and KPIs in a strategy map and balanced score card style
@watisonik8 ай бұрын
Thank you Mark for this video, I found it very informative and sussinctly exemplified. I wanted to ask, are these 10 layers based off a certain industry framework or standard? Some of the layers I've seen with some security vendors, but would love to know it's root of reference so I can use it in my conversations. Thank you.
@mbernard94568 ай бұрын
Hello, The defense-in-depth is based on technology deployment, and its purpose establishing 10 layers of defense.
@watisonik8 ай бұрын
@mbernard9456 thank you for clarifying that.
@ydlitvak8 ай бұрын
this is one of the best RM and RTP explanations I have seen to date
@ramadossc9 ай бұрын
Thank you, Mark!
@Ritrit159 ай бұрын
thank you for your share , Is there a continuation of the lessons please ?
@samvox99410 ай бұрын
Wow looking for an explanation like this awesome
@Ritrit1510 ай бұрын
thanks a lot for all this information and skills you share with us
@tetaguila784110 ай бұрын
your courses are all online with trainor? thanks
@TheShani201211 ай бұрын
Thank you
@MagnificatPraise11 ай бұрын
Very insightful 👏
@moe6271 Жыл бұрын
🙄 *Promo SM*
@ahmedsemary8693 Жыл бұрын
amazing interview thanks bernard
@corypopescu3789 Жыл бұрын
I like also the remark about the interruption of services and the customer not wanting to pay. Depending on what's in the SLA, as you mentioned however, wouldn't it be already mentioned in the agreement there is an uptime of some 99999s and then, according to this, of course it is tracked properly, and only according to the figures, the invoice gets paid or not
@corypopescu3789 Жыл бұрын
Thank You, informative, comprehensive, and insightful! Its particular important nowadays to safeguard the assets. How do you manage to get them all under one "umbrella" knowing that as you said, there's a huge amount of physical assets. And what to do with the legacy ones, I guess we take them one at a time, or categorize them. I am truly interested to know more about vCISO as you said today we do a lot of virtual management. Thank you again.
@whitehat_stanley Жыл бұрын
I came here from your LinkedIn, thanks for this valuable information. How can someone like me trying to breaking into Cybersecurity entry role master these key Laws & Regulations. AND frameworks? Which ones are key and valuable to know as a cybersecurity analyst?
@mbernard9456 Жыл бұрын
Start with the country that you work in and gather the regional and national laws, then regulations, contract knowledge will come from the company that you work for.
@mayayazdanifar-bernard8682 Жыл бұрын
Thank you for sharing ,very helpful
@mbernard9456 Жыл бұрын
Thank you for your support and positive comments Maya. ☺👌
@lisatorres2234 Жыл бұрын
Very insightful thank you! I learned something new!!
@abbierollin6180 Жыл бұрын
"Promosm"
@ayekula Жыл бұрын
Thanks for sharing GREAT content.......
@annhines9062 Жыл бұрын
Good overview 👍🏻
@stealmysunshine Жыл бұрын
Thank you. It's hard to find concisely worded clips on this
@AlexanderSverdlov Жыл бұрын
Which of the 347 security controls in NIST CSF need to be covered/completed in Tier 1?
@mbernard9456 Жыл бұрын
Good afternoon Alexander, Thank you for your message. I hope that you are well and in good spirits. I agree and completely understand your observation. There are two measuring sticks, the CMMI and the Target Profile, not to be confused. There are 108 control objectives, and the goal is to set a target profile and move 108 control objectives from 1 to 5 on the CMMI. It's possible to set out a strategy where you achieve target profile #1 initially, the Target Profile in 12 months, Target Profile #3 in 24 months, and finally, Target Profile #4 in 36 months. BTW: Your organization may not need to achieve Target Profile #4. The Target Profile goal depends on your organization's role within USA Critical Infrastructure. I hope this explains the NIST CSF adoption process. Sincerely, Mark.
@AlexanderSverdlov Жыл бұрын
@@mbernard9456 thank you, Mark! Do you sell any tools or tracking sheets for this?
@dmnick123ify2 ай бұрын
@mbernard9456 I'm still confused. You see, with CIS controls for example, I know there is IG1, IG2, and IG3. So when I'm selecting, I know which controls applies to me. On the contrary with CSF, it still seem confusing. Are there certain controls that correspond to the tier levels 1 -4? Pls explain to me like a 5 year old.
@manju4ever2222 жыл бұрын
This was very apt and concise for developers like me.
@allsmiles32812 жыл бұрын
Thank you.
@jeanrocheleau17812 жыл бұрын
Thanks for this in depth information Mr. Bernard!!
@mbernard94562 жыл бұрын
You are very welcome Jean! Please keep in touch by subscribing I have new material coming soon.
@balajigis72622 жыл бұрын
Great explanation on RTP. Thankyou very much for sharing.
@mbernard94562 жыл бұрын
Thank you Balaji ;)
@SP800.692 жыл бұрын
Thank you for this.
@Cyber_security_COE2 жыл бұрын
Thank you C Davis 😊
@mrdhuuke58322 жыл бұрын
thanks i need than cyber security is the important issue to the all institutions public or prevaricates, we need to building new program to stop thefts an attacks midnight.
@cybersecurityforever82142 жыл бұрын
Marvelous, thank you for sharing this wonderful information...Great job.👏👏👏 kzbin.infogaming/emoji/7ff574f2/emoji_u1f44b.png
@youtubechannelgrouthbyashe76182 жыл бұрын
Great Content
@pizzadeliverygurl2 жыл бұрын
Great informative videos thank you for posting these :)
@optimusprime27992 жыл бұрын
Your videos should be above a million likes 👍
@Cyber_security_COE2 жыл бұрын
Thank you, Optimus! I hope so too... please help by sharing.
@optimusprime27992 жыл бұрын
Bless you!! AWESOME material. 🙌
@Cyber_security_COE2 жыл бұрын
Thank you, Optimus! Please share! ;-)
@hiriadka1002 жыл бұрын
Nicely explained. Thank you.
@Cyber_security_COE2 жыл бұрын
Thank you Hiriadka! I really appreciate your feedback.
@ioannismichelakos66112 жыл бұрын
Thank you so much for this helpful series of videos. When you will release the rest of them?
@Cyber_security_COE2 жыл бұрын
I hope very soon! Thank you for your comments - please subscribe, like, and share! ;-)
@cybersecurityforever82142 жыл бұрын
@@Cyber_security_COE thank you so much for the knowledge you shared. I didn't find the lesson from 9-23.
@serheangtan61952 жыл бұрын
Thank you very much! The information provided is easy to follow, and it definitely helped to understand and continue growing with my Cyber Security Journey
@aminvogue2 жыл бұрын
Golden ................ Thanks a lot sir
@Cyber_security_COE2 жыл бұрын
Thank you Sagar! Please share.
@daikennett2 жыл бұрын
Appreciate the video sir, but at 5:39 its Domain Name System and not Domain Network Services :)
@daikennett2 жыл бұрын
Also straight after that its Virtual LAN not Virtual Logical network :) (don't mean to criticize and thanks for the vids!)
@daikennett2 жыл бұрын
Just watched further and you clear it up! Nice thanks!
@treeorwh22 жыл бұрын
I couldn’t stop staring at the confidential classification at the bottom of the slide… And now its on KZbin. See layer 8… Otherwise, really great overview, thank you very much!
@Cyber_security_COE2 жыл бұрын
Confidential to me and the people I share it with and my subscribers can share the links freely. My materials are not for downloading copying and redistribution under another name which is why the confidential label has been applied.
@marianam13152 жыл бұрын
Thank you very much, this is very helpful and gave a very good overview of the subject. 🙏
@GPS3792 жыл бұрын
really beautiful 😇
@ZohaibHassanAfridi3 жыл бұрын
You are doing great. I would suggest creating Separate playlists so that it would be easy for students like me to search the relevant video. Hats off.
@Cyber_security_COE2 жыл бұрын
Thank you Zohaib! I created my first playlist and learned a lot about the process so I can make more. Thank you for the encouragement. ;-)
@numanmaavia85753 жыл бұрын
Great session
@Cyber_security_COE2 жыл бұрын
Thank you Numan. I appreciate you taking the time to watch my video and share your comments. ;-)
@shakmughal56993 жыл бұрын
Liked and Subscribed
@Cyber_security_COE2 жыл бұрын
Thank you Shak! I am happy that you found it useful.