1. Dominando o NIST Cybersecurity Framework 2.0: O Que Mudou e Como Aplicar na Sua Organização

    Dominando o NIST Cybersecurity Framework 2.0: O Que Mudou e Como Aplicar na Sua Organização

    7
  2. OT Network Architecture | OT Cybersecurity Controls | Introduction to ICS/OT Pentesting

    OT Network Architecture | OT Cybersecurity Controls | Introduction to ICS/OT Pentesting

    8
  3. Exploring the Impact of Crime Prevention Strategies: An Insightful Discussion with Dr. John Lott - Part 2

    Exploring the Impact of Crime Prevention Strategies: An Insightful Discussion with Dr. John Lott - Part 2

    1.23K
  4. John Key Insider Trading ANZ Bank partners Pfizer wall st Corruption Report

    John Key Insider Trading ANZ Bank partners Pfizer wall st Corruption Report

    4
    0
    277
    3
  5. Korero Mai & Whistle Blower News Thursday 23rd May 2024

    Korero Mai & Whistle Blower News Thursday 23rd May 2024

    3
    0
    105
    2
  6. Demystifying Cybersecurity Frameworks like CIS, NIST, MITRE & Operationalizing Controls

    Demystifying Cybersecurity Frameworks like CIS, NIST, MITRE & Operationalizing Controls

    2
    0
    40
    1
  7. Friday Conversation: Enhancing Cyber Resilience: Key Takeaways from Chris and James

    Friday Conversation: Enhancing Cyber Resilience: Key Takeaways from Chris and James

    10
  8. The Framework Foundation of NIST CSF as Risk Management for CISO & Practitioners

    The Framework Foundation of NIST CSF as Risk Management for CISO & Practitioners

    6
  9. Identity is the New Perimeter with Jeff Reich, Executive Director at IDSA

    Identity is the New Perimeter with Jeff Reich, Executive Director at IDSA

    39
  10. The Evolution of Ethical Hacking: Pioneers, Paradigms, and Progress

    The Evolution of Ethical Hacking: Pioneers, Paradigms, and Progress

    29
  11. What the wban is actually used for!

    What the wban is actually used for!

    122
    0
    7.01K
    33
  12. The military alliance have control. We are near endgame - with Michelle Fielding

    The military alliance have control. We are near endgame - with Michelle Fielding

    25
    1
    918
    4
  13. Neural recording overview - Digi id IS your blockchain remote PHY

    Neural recording overview - Digi id IS your blockchain remote PHY

    44
    1
    3.24K
    12
  14. WHAT THE WBAN (WIRELESS BODY AREA NETWORK) IS ACTUALLY USED FOR | SABRINA WALLACE (PSINERGY)

    WHAT THE WBAN (WIRELESS BODY AREA NETWORK) IS ACTUALLY USED FOR | SABRINA WALLACE (PSINERGY)

    2
    0
    223
  15. Advanced Windows & Android Hacking (Social-Engineering Phishing Exploitation Techniques) Kali-Linux

    Advanced Windows & Android Hacking (Social-Engineering Phishing Exploitation Techniques) Kali-Linux

    5
    0
    566
    2
  16. Windows XP/Vista/7/8/10 Remote SMB Exploitation - Gain Full Remote System Access To Windows Systems

    Windows XP/Vista/7/8/10 Remote SMB Exploitation - Gain Full Remote System Access To Windows Systems

    2
    0
    49
    1
  17. Enhancing Healthcare Security: Zero Trust Block with Pratik Thantharate

    Enhancing Healthcare Security: Zero Trust Block with Pratik Thantharate

    63
  18. Python Full Course

    Python Full Course

    2
    0
    42