This is one of the best explanations and overviews I have seen. Not that there arent others but this is the best I have found and it helps tremendously. I like how the role is broken down and it is explained that can be beneficial to current CISOs and not just virtual ones. Benard is to be commended for his efforts.
@parth96987 ай бұрын
helpful topic
@networkengineerinjapan8 ай бұрын
Awesome contents!!!
@watisonik10 ай бұрын
Thank you Mark for this video, I found it very informative and sussinctly exemplified. I wanted to ask, are these 10 layers based off a certain industry framework or standard? Some of the layers I've seen with some security vendors, but would love to know it's root of reference so I can use it in my conversations. Thank you.
@mbernard945610 ай бұрын
Hello, The defense-in-depth is based on technology deployment, and its purpose establishing 10 layers of defense.
@watisonik10 ай бұрын
@mbernard9456 thank you for clarifying that.
@ydlitvak11 ай бұрын
this is one of the best RM and RTP explanations I have seen to date
@ramadossc11 ай бұрын
Thank you, Mark!
@Ritrit15 Жыл бұрын
thank you for your share , Is there a continuation of the lessons please ?
@samvox994 Жыл бұрын
Wow looking for an explanation like this awesome
@Ritrit15 Жыл бұрын
thanks a lot for all this information and skills you share with us
@tetaguila7841 Жыл бұрын
your courses are all online with trainor? thanks
@TheShani2012 Жыл бұрын
Thank you
@MagnificatPraise Жыл бұрын
Very insightful 👏
@moe6271 Жыл бұрын
🙄 *Promo SM*
@ahmedsemary8693 Жыл бұрын
amazing interview thanks bernard
@corypopescu3789 Жыл бұрын
I like also the remark about the interruption of services and the customer not wanting to pay. Depending on what's in the SLA, as you mentioned however, wouldn't it be already mentioned in the agreement there is an uptime of some 99999s and then, according to this, of course it is tracked properly, and only according to the figures, the invoice gets paid or not
@corypopescu3789 Жыл бұрын
Thank You, informative, comprehensive, and insightful! Its particular important nowadays to safeguard the assets. How do you manage to get them all under one "umbrella" knowing that as you said, there's a huge amount of physical assets. And what to do with the legacy ones, I guess we take them one at a time, or categorize them. I am truly interested to know more about vCISO as you said today we do a lot of virtual management. Thank you again.
@whitehat_stanley Жыл бұрын
I came here from your LinkedIn, thanks for this valuable information. How can someone like me trying to breaking into Cybersecurity entry role master these key Laws & Regulations. AND frameworks? Which ones are key and valuable to know as a cybersecurity analyst?
@mbernard9456 Жыл бұрын
Start with the country that you work in and gather the regional and national laws, then regulations, contract knowledge will come from the company that you work for.
@mayayazdanifar-bernard8682 Жыл бұрын
Thank you for sharing ,very helpful
@mbernard9456 Жыл бұрын
Thank you for your support and positive comments Maya. ☺👌
@lisatorres2234 Жыл бұрын
Very insightful thank you! I learned something new!!
@abbierollin6180 Жыл бұрын
"Promosm"
@ayekula Жыл бұрын
Thanks for sharing GREAT content.......
@annhines9062 Жыл бұрын
Good overview 👍🏻
@stealmysunshine Жыл бұрын
Thank you. It's hard to find concisely worded clips on this
@AlexanderSverdlov2 жыл бұрын
Which of the 347 security controls in NIST CSF need to be covered/completed in Tier 1?
@mbernard94562 жыл бұрын
Good afternoon Alexander, Thank you for your message. I hope that you are well and in good spirits. I agree and completely understand your observation. There are two measuring sticks, the CMMI and the Target Profile, not to be confused. There are 108 control objectives, and the goal is to set a target profile and move 108 control objectives from 1 to 5 on the CMMI. It's possible to set out a strategy where you achieve target profile #1 initially, the Target Profile in 12 months, Target Profile #3 in 24 months, and finally, Target Profile #4 in 36 months. BTW: Your organization may not need to achieve Target Profile #4. The Target Profile goal depends on your organization's role within USA Critical Infrastructure. I hope this explains the NIST CSF adoption process. Sincerely, Mark.
@AlexanderSverdlov2 жыл бұрын
@@mbernard9456 thank you, Mark! Do you sell any tools or tracking sheets for this?
@dmnick123ify5 ай бұрын
@mbernard9456 I'm still confused. You see, with CIS controls for example, I know there is IG1, IG2, and IG3. So when I'm selecting, I know which controls applies to me. On the contrary with CSF, it still seem confusing. Are there certain controls that correspond to the tier levels 1 -4? Pls explain to me like a 5 year old.
@manju4ever2222 жыл бұрын
This was very apt and concise for developers like me.
@allsmiles32812 жыл бұрын
Thank you.
@jeanrocheleau17812 жыл бұрын
Thanks for this in depth information Mr. Bernard!!
@mbernard94562 жыл бұрын
You are very welcome Jean! Please keep in touch by subscribing I have new material coming soon.
@balajigis72622 жыл бұрын
Great explanation on RTP. Thankyou very much for sharing.
@mbernard94562 жыл бұрын
Thank you Balaji ;)
@SP800.692 жыл бұрын
Thank you for this.
@Cyber_security_COE2 жыл бұрын
Thank you C Davis 😊
@mrdhuuke58322 жыл бұрын
thanks i need than cyber security is the important issue to the all institutions public or prevaricates, we need to building new program to stop thefts an attacks midnight.
@cybersecurityforever82142 жыл бұрын
Marvelous, thank you for sharing this wonderful information...Great job.👏👏👏 kzbin.infogaming/emoji/7ff574f2/emoji_u1f44b.png
@youtubechannelgrouthbyashe76182 жыл бұрын
Great Content
@pizzadeliverygurl2 жыл бұрын
Great informative videos thank you for posting these :)
@optimusprime27992 жыл бұрын
Your videos should be above a million likes 👍
@Cyber_security_COE2 жыл бұрын
Thank you, Optimus! I hope so too... please help by sharing.
@optimusprime27992 жыл бұрын
Bless you!! AWESOME material. 🙌
@Cyber_security_COE2 жыл бұрын
Thank you, Optimus! Please share! ;-)
@hiriadka1002 жыл бұрын
Nicely explained. Thank you.
@Cyber_security_COE2 жыл бұрын
Thank you Hiriadka! I really appreciate your feedback.
@ioannismichelakos66112 жыл бұрын
Thank you so much for this helpful series of videos. When you will release the rest of them?
@Cyber_security_COE2 жыл бұрын
I hope very soon! Thank you for your comments - please subscribe, like, and share! ;-)
@cybersecurityforever82142 жыл бұрын
@@Cyber_security_COE thank you so much for the knowledge you shared. I didn't find the lesson from 9-23.
@serheangtan61952 жыл бұрын
Thank you very much! The information provided is easy to follow, and it definitely helped to understand and continue growing with my Cyber Security Journey
@aminvogue2 жыл бұрын
Golden ................ Thanks a lot sir
@Cyber_security_COE2 жыл бұрын
Thank you Sagar! Please share.
@daikennett2 жыл бұрын
Appreciate the video sir, but at 5:39 its Domain Name System and not Domain Network Services :)
@daikennett2 жыл бұрын
Also straight after that its Virtual LAN not Virtual Logical network :) (don't mean to criticize and thanks for the vids!)
@daikennett2 жыл бұрын
Just watched further and you clear it up! Nice thanks!
@treeorwh22 жыл бұрын
I couldn’t stop staring at the confidential classification at the bottom of the slide… And now its on KZbin. See layer 8… Otherwise, really great overview, thank you very much!
@Cyber_security_COE2 жыл бұрын
Confidential to me and the people I share it with and my subscribers can share the links freely. My materials are not for downloading copying and redistribution under another name which is why the confidential label has been applied.
@marianam13152 жыл бұрын
Thank you very much, this is very helpful and gave a very good overview of the subject. 🙏
@GPS3793 жыл бұрын
really beautiful 😇
@ZohaibHassanAfridi3 жыл бұрын
You are doing great. I would suggest creating Separate playlists so that it would be easy for students like me to search the relevant video. Hats off.
@Cyber_security_COE2 жыл бұрын
Thank you Zohaib! I created my first playlist and learned a lot about the process so I can make more. Thank you for the encouragement. ;-)
@numanmaavia85753 жыл бұрын
Great session
@Cyber_security_COE2 жыл бұрын
Thank you Numan. I appreciate you taking the time to watch my video and share your comments. ;-)
@shakmughal56993 жыл бұрын
Liked and Subscribed
@Cyber_security_COE3 жыл бұрын
Thank you Shak! I am happy that you found it useful.
@shakmughal56993 жыл бұрын
Thank you - Great Job
@Cyber_security_COE3 жыл бұрын
Glad it was helpful!
@SundasLatif3 жыл бұрын
Thanks, for sharing knowledge. Please create playlists, it will be easy to search vedios.
@Cyber_security_COE3 жыл бұрын
Thank you for that suggestion. I am looking at making playlists. Do you have any suggestions regarding their design or focus?
@SundasLatif3 жыл бұрын
@@Cyber_security_COE If you can create separate playlist for ISO 27001, it'll be great. I have gone through one lecture and it's been explained very well. If someone not having prior experience will watch these vedios will be quite helpful. Please make a vedio risk assessment considering an organizations scenario, I've studied many books and articles but it's quite difficult to relate as that content is generic. Many thanks!
@Cyber_security_COE3 жыл бұрын
@@SundasLatif Thank you, Sundas. Great feedback. I will be creating a playlist for ISO 27001 and NIST CSF. I am trying to clean up and re-organize as I go, so the playlist has a logical flow of content. I will create a new risk management slide deck covering the top to bottom of the RM process to help connect the dots. I have case studies from my course content.
@SundasLatif3 жыл бұрын
@@Cyber_security_COE Waiting for RM, and thanks for considering feedback.