HITRUST Essentials: Framework, Benefits, and Certification Process

1:01:10
Cyber Risk Management: Essentials for the Practical CISO

1:07:55
CISM EXAM PREP - Domain 1B - Information Security Strategy

14:48
Cybersecurity Architecture: Data Security

35:31
What is Agile? | Agile Methodology | Agile Frameworks - Scrum, Kanban, Lean, XP, Crystal | Edureka

19:23
Draft Digital Personal Data Protection Rules, 2025 | InFocus | Drishti IAS English

55:40
Mastering GRC with ISO 27001:2022 Risk Assessment Made Easy!

28:09
Right-sizing security across Amazon businesses | Amazon Web Services

41:31