68Results for "Disaster Risk Reduction"
-
What are the risks of doing nothing on emissions reduction?4m
What are the risks of doing nothing on emissions reduction?
From: ESG and Procurement: How to Decarbonize Your Supply Base
Video
-
Disaster aftermath threats and risks2m
Disaster aftermath threats and risks
From: Build Your First Disaster Recovery Plan (DRP)
Video
-
Risk assessment and mitigation strategies6m
Risk assessment and mitigation strategies
From: 5G Network Security
Video
-
The Business Value of Action on Climate and Sustainability53m
The Business Value of Action on Climate and Sustainability
By: Andrew Winston
Course
-
Business continuity, technology resilience, and disaster recovery17m
Business continuity, technology resilience, and disaster recovery
From: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep
Video
-
Leading cross-functional collaboration for risk reduction2m
Leading cross-functional collaboration for risk reduction
From: Security Governance and Compliance for Cybersecurity Managers: From Structure Design to Board Reporting
Video
-
Business continuity and disaster recovery planning8m
Business continuity and disaster recovery planning
From: ISACA Certified Information System Manager (CISM) Cert Prep
Video
-
What is threat modeling?4m
What is threat modeling?
From: Advanced Threat Modeling and Risk Assessment in DevSecOps
Video
-
Disaster prevention strategies1m
Disaster prevention strategies
From: Build Your First Disaster Recovery Plan (DRP)
Video
-
Making the strategy last6m
Making the strategy last
From: Strategic Leadership for Cybersecurity Managers: From Team Management to Security Culture Development
Video
-
Governing and sustaining supplier relationship management (SRM)3m
Governing and sustaining supplier relationship management (SRM)
From: Mastering Supplier Relationship Management (SRM)
Video
-
Risk management overview3m
Risk management overview
From: Building and Managing a Cybersecurity Program
Video
-
The challenges of proactive cyber security4m
The challenges of proactive cyber security
From: Introduction to SecOps on Google Distributed Cloud (GDC) by Google
Video
-
Data backups to defend against ransomware and cyber threats4m
Data backups to defend against ransomware and cyber threats
From: Building and Auditing a Cybersecurity Program
Video
-
Climate change adaptation4m
Climate change adaptation
From: Sustainability for Design, Construction, and Manufacturing
Video
-
Climate change: A key factor in ESG integration2m
Climate change: A key factor in ESG integration
From: Climate Change: A Top ESG Concern
Video
-
The five types of B2B business benefits2m
The five types of B2B business benefits
From: B2B Marketing Foundations: Positioning
Video
-
Construct an annual program of work5m
Construct an annual program of work
From: Building and Managing a Cybersecurity Program
Video
-
Disaster recovery sites4m
Disaster recovery sites
From: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep
Video
-
Determine measurement frequency2m
Determine measurement frequency
From: Measuring and Managing Top Cyber Risks
Video
-
Construct an annual program of work5m
Construct an annual program of work
From: Measuring and Managing Top Cyber Risks
Video
-
Measuring success in digital transformation4m
Measuring success in digital transformation
From: Digital Transformation for Leaders in the AI Era
Video
-
Risk/value scoring for Ops6m
Risk/value scoring for Ops
From: Strategic Cyber Effects Management
Video
-
What is IT risk tolerance?3m
What is IT risk tolerance?
From: IT and Cybersecurity Risk Management Essential Training
Video
-
Treat identified risks in AI systems3m
Treat identified risks in AI systems
From: Managing AI Security Risks with ISO 27001
Video
-
Continuity (Controls 5.29, 5.30, and 8.13)5m
Continuity (Controls 5.29, 5.30, and 8.13)
From: ISO 27001:2022-Compliant Cybersecurity: The Annex A Controls
Video
-
Tracking and monitoring audit remediation3m
Tracking and monitoring audit remediation
From: Cybersecurity Audit and Assessment Fundamentals for GRC Analysts: From Vendor Risk to Incident Coordination
Video
-
Security fundamentals and threat analysis44m
Security fundamentals and threat analysis
From: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
Video
-
Distributed security at the edge3m
Distributed security at the edge
From: Understanding Edge Computing in a Cloud Computing World
Video
-
Managing and governing data5m
Managing and governing data
From: Building a Data-Driven Culture
Video
-
Business objectives of ZT3m
Business objectives of ZT
From: Certificate of Competence in Zero Trust (CCZT) Cert Prep
Video
-
Integrating cybersecurity into disaster recovery3m
Integrating cybersecurity into disaster recovery
From: Building and Auditing a Cybersecurity Program
Video
-
Industry examples from path I: Tooling and product development2m
Industry examples from path I: Tooling and product development
From: Additive Manufacturing for Business
Video
-
Getting beyond generic benefits3m
Getting beyond generic benefits
From: B2B Marketing Foundations: Positioning
Video
-
Why effective communication between stakeholders matters5m
Why effective communication between stakeholders matters
From: Decision Intelligence: Data Stories
Video
-
Industry examples from path II: Supply chain evolution2m
Industry examples from path II: Supply chain evolution
From: Additive Manufacturing for Business
Video
-
Tools to activate your sustainability leadership4m
Tools to activate your sustainability leadership
From: Transform Your Business through Sustainability and Climate Leadership
Video
-
Disaster recovery4m
Disaster recovery
From: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep
Video
-
Your #1 competitor4m
Your #1 competitor
From: Technical Sales: The Role of the Sales Engineer
Video
-
Prioritizing remediation efforts with metrics3m
Prioritizing remediation efforts with metrics
From: DevSecOps Metrics and Continuous Improvement
Video
-
Define ISMS success criteria7m
Define ISMS success criteria
From: Cybersecurity Governance: Integrate NIST and ISO Standards in 16 Steps
Video
-
Protecting Profitability by Reducing Financial Risk1h 53m
Protecting Profitability by Reducing Financial Risk
By: Dan Weedin
Course