IT / Information Security Risk Management With Examples | In Urdu & English (Bilingual)

  Рет қаралды 3,319

Ali Qureshi

Ali Qureshi

Күн бұрын

Пікірлер: 12
@vback4238
@vback4238 8 ай бұрын
Wow!! In multiple languages. Appreciate your dedication!
@aliqureshi2227
@aliqureshi2227 8 ай бұрын
Thank you very much!
@sahilbakshi4265
@sahilbakshi4265 2 жыл бұрын
One of the best resource on youtube.
@aliqureshi2227
@aliqureshi2227 Жыл бұрын
Thank you very much for your kind words 😊
@Kashifraheemi45
@Kashifraheemi45 Жыл бұрын
awesome method sir ....🥰🥰🥰
@aliqureshi2227
@aliqureshi2227 Жыл бұрын
Thank you very much 😊 Appreciate your kind words
@MYYMYT
@MYYMYT 4 жыл бұрын
More power to you man
@aliqureshi2227
@aliqureshi2227 4 жыл бұрын
MYYM Thank you very much.
@DQ-Lifestyle
@DQ-Lifestyle 2 жыл бұрын
Asset owner means product owner? or service owner? who is managing the service for its customers on behalf of his organization? for eg: any dept. manager? kindly explain it again...
@aliqureshi2227
@aliqureshi2227 2 жыл бұрын
Hi Shahnawaz. Would recommend to read the definitions again on 14:25, I believe your questions will be answered. Asset owner can be anyone who will be accountable for the respective asset. If you are doing an asset based risk management (which is recommended in information/cyber security) then the concept of service owner will be omitted. On the other hand, if you are performing a service based / process based risk assessment then it will be different. Regardless, as suggested you may find your answer in the slide. Managing service for customer? I am not quite sure if I understand your point however, the roles and responsibilities / department charter lays down regarding who will do what.
@ziyadalvi2094
@ziyadalvi2094 4 жыл бұрын
❤️
@aliqureshi2227
@aliqureshi2227 4 жыл бұрын
Ziyad Alvi Thanks Ziyad
IT / Information Security Risk Management With Examples
29:20
Ali Qureshi
Рет қаралды 53 М.
Try this prank with your friends 😂 @karina-kola
00:18
Andrey Grechka
Рет қаралды 9 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
Information Security Risk Management
15:40
Pratik Kadam
Рет қаралды 12 М.
Diffie Hellman Key Exchange Algorithm with Example
10:16
A Z Computing
Рет қаралды 10 М.
Why RISC-V Matters
13:42
ExplainingComputers
Рет қаралды 9 М.
CISM | COMPLETE PREPARATION FREE |
1:01:38
Shailendra Srivastava
Рет қаралды 537
Risk management analysis of Huawei
7:17
deewas khanal
Рет қаралды 4