CSO
CSO
  • Видео 259
  • Просмотров 554 339
CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other events cybersafe
Bryan Woodworth - Director of Solution Strategy at Aviatrix - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about safeguarding the #olympics from cyber threats, operational technology and IoT considerations for critical infrastructure, and more.
#cybersecurity #cybercrime #iot
Follow CSO for more Business IT and Web Security News!
------------------------------­----
SUBSCRIBE: ruclips.net/user/CSOonline
FACEBOOK: CSOonline/
TWITTER: CSOonline
WEBSITE: www.csoonline.com/
Просмотров: 35

Видео

CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)
Просмотров 2928 дней назад
When it comes to healthcare, India trusts AIIMS. And when you maintain the IT backbone of this renowned institution, the stakes are unparalleled. We sit down with Dr Susil Kumar Meher, Head Health IT of AIIMS, to get the pulse on how medicine and IT come together to saves lives, how AI has been heralded by the institute, and more, in this episode of CSO Executive Sessions. Follow CSO for more B...
Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)
Просмотров 1728 дней назад
When it comes to healthcare, India trusts AIIMS. And when you maintain the IT backbone of this renowned institution, the stakes are unparalleled. We sit down with Dr Susil Kumar Meher, Head Health IT of AIIMS, to get the pulse on how medicine and IT come together to saves lives, how AI has been heralded by the institute, and more, in this episode of CSO Executive Sessions.
CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands
Просмотров 13Месяц назад
How does Bata espouse its tenets of quality and excellence when securing its cybersecurity frontiers? Do disruptions in supply chain hamper Bata's business and customer satisfaction? CHaranjit Batia, Head of Cybersecurity and CoE, lets us walk a mile in his shoes, in this episode of CSO Executive Sessions. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ruclips.net/user/CSOo...
Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands
Просмотров 13Месяц назад
How does Bata espouse its tenets of quality and excellence when securing its cybersecurity frontiers? Do disruptions in supply chain hamper Bata's business and customer satisfaction? Charanjit Batia, Head of Cybersecurity and COE, lets us walk a mile in his shoes, in this episode of CSO Executive Sessions.
CSO Executive Sessions: Data protection in Malaysia
Просмотров 25Месяц назад
Toh Shang Yee - Head of Information Security at MCIS Life - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about data governance and regulations in Malaysia, strategies to ensure resilience, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ruclips.net/user/CSOonline FACEBOOK: CSOonline/ TWITTER: CSOonline WEBSITE: ww...
CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas
Просмотров 26Месяц назад
When oil and gas infrastructure directly impact a nation's economy, how high are the stakes for cybersecurity? Is operational vulnerability the weak link, and what can a leader do to remedy that? Mrinal Kanti Roy, CISO, Cairn Oil and Gas answers these and more, in this episode of CSO Executive Sessions. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ruclips.net/user/CSOonli...
Mrinal Kanti Roy, CISO, Cairn Oil and Gas
Просмотров 4Месяц назад
When oil and gas infrastructure directly impact a nation's economy, how high are the stakes for cybersecurity? Is operational vulnerability the weak link, and what can a leader do to remedy that? Mrinal Kanti Roy, CISO, Cairn Oil and Gas answers these and more, in this episode of CSO Executive Sessions.
Hilal Lone, CISO, Razorpay
Просмотров 102 месяца назад
Money is the lifeblood of any economy, and where it goes, progress follows. Hilal Lone, CISO of Razorpay sits down with us for an exclusive chat on the cash app’s emphasis on data privacy, how pertinent is the risk of fraud in the industry, and India’s rising literacy and comfort with the digital payments paradigm.
CSO Executive Sessions: The new realities of the CISO role - whistleblowing and legal liabilities
Просмотров 282 месяца назад
Mark Bowling - Chief Information Security and Risk Officer at ExtraHop - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about the repercussions of more stringent reporting regulations, penalties CISOs may have to face, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ruclips.net/user/CSOonline FACEBOOK: CSOonline/ TWITTER: twitt...
CSO Executive Session India with Pradipta Kumar Patro, KEC International
Просмотров 272 месяца назад
Pradipta Kumar Patro, Global CISO and Head IT Platform of KEC International Limited (an RPG Group Company), discusses the technology trends that KEC International has incorporated in the business, their utilization of AI, and what his years in the business have taught him about leadership, in this episode of CSO Executive Sessions India. Follow CSO for more Business IT and Web Security News! ­ ...
Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International
Просмотров 202 месяца назад
Pradipta Kumar Patro, Global CISO and Head IT Platform of KEC International Limited (an RPG Group Company), discusses the technology trends that KEC International has incorporated in the business, their utilization of AI, and what his years in the business have taught him about leadership, in this episode of CSO Executive Sessions India.
CSO Executive Sessions: The personality of cybersecurity leaders
Просмотров 503 месяца назад
Paul McCarthy - CEO and Co-Founder of the League of Scholars - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about the personality traits of cybersecurity leaders, how they differ from CIOs, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ruclips.net/user/CSOonline FACEBOOK: CSOonline/ TWITTER: CSOonline WEBSITE: w...
CSO Executive Sessions: Tensions in the South China Sea and why the private sector should care
Просмотров 794 месяца назад
CSO Executive Sessions: Tensions in the South China Sea and why the private sector should care
CSO Executive Sessions: 2024 International Women's Day special
Просмотров 315 месяцев назад
CSO Executive Sessions: 2024 International Women's Day special
CSO Executive Sessions ASEAN: Former convicted hacker Hieu Minh Ngo on blindspots in data protection
Просмотров 795 месяцев назад
CSO Executive Sessions ASEAN: Former convicted hacker Hieu Minh Ngo on blindspots in data protection
Preventing the Cracks from Becoming a Hole that Becomes a Crater
Просмотров 157 месяцев назад
Preventing the Cracks from Becoming a Hole that Becomes a Crater
Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data
Просмотров 1637 месяцев назад
Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data
Reaping the Benefits of Security Metrics
Просмотров 187 месяцев назад
Reaping the Benefits of Security Metrics
CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison
Просмотров 198 месяцев назад
CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison
AI and Cybersecurity: Speed Bumps, Training, and Communication
Просмотров 699 месяцев назад
AI and Cybersecurity: Speed Bumps, Training, and Communication
CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University
Просмотров 3010 месяцев назад
CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University
Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape
Просмотров 8410 месяцев назад
Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape
CSO Executive Sessions Australia with Leron Zinatullin, CISO at Linkly
Просмотров 3910 месяцев назад
CSO Executive Sessions Australia with Leron Zinatullin, CISO at Linkly
CSO Executive Sessions Australia with Nathan Morelli, Head of Cyber Security, SA Power Networks
Просмотров 4410 месяцев назад
CSO Executive Sessions Australia with Nathan Morelli, Head of Cyber Security, SA Power Networks
CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical
Просмотров 2610 месяцев назад
CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical
CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role
Просмотров 3711 месяцев назад
CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role
CSO Executive Sessions / ASEAN: SMRT's Huang Shao Fei on safeguarding critical infrastructure
Просмотров 2911 месяцев назад
CSO Executive Sessions / ASEAN: SMRT's Huang Shao Fei on safeguarding critical infrastructure
CSO Executive Sessions Australia with Eugene Ostapenko, illion
Просмотров 2211 месяцев назад
CSO Executive Sessions Australia with Eugene Ostapenko, illion
CSO Executive Sessions / ASEAN: IDC's Christian Fam on the state of digital trust in APAC
Просмотров 7611 месяцев назад
CSO Executive Sessions / ASEAN: IDC's Christian Fam on the state of digital trust in APAC

Комментарии

  • @jam_oga_boss
    @jam_oga_boss 27 дней назад

    Swacktech en lG puede ayudar a eliminar el ransomware de su dispositivo.

  • @BenHermann-zo9wj
    @BenHermann-zo9wj 2 месяца назад

    The lack of comments to this video is a sure sign of head-in-the-sand mentality. People can't grasp the humongous dimension of these attacks, they don't value their own data privacy. Shaking my head in disbelief.

  • @strixx9014
    @strixx9014 4 месяца назад

    I was attacked with djvu, i suppose i deleted it because i downloaded some archives and they are not encrypted, but i dont have a backup of the same archives for recovery, what can i do? can i make a copy of an mp4 file and encrypt it to use as a sample? help please

  • @anjannaprince
    @anjannaprince 4 месяца назад

    wahhh bhai❤❤❤ mama agya

  • @WilliamJames-gt4kt
    @WilliamJames-gt4kt 5 месяцев назад

    I had this same issues I couldn't fined help not until someone here referred me to (TobiasCyber)

  • @veyvey7486
    @veyvey7486 5 месяцев назад

    I was having this same issues lately but i was referred to someone.

  • @shyamvagadiya649
    @shyamvagadiya649 7 месяцев назад

    Hi, how can I scan the internet for a specific keyword, for example: my brand name and sort out the fraudulent domains?

  • @jjtalavera7906
    @jjtalavera7906 7 месяцев назад

    Please notice me how about in onedrive account?

  • @orlandovillat
    @orlandovillat 7 месяцев назад

    I fully agree with the search for simplifications and its benefits. However, In relation to Low Code.... I see a contradiction in terms of search for simplification and use of Low Code tools. In my experience low code tools do not satisfy all scenarios, which translate into varied tooling environment. Varied tooling introduces various operational methodologies, various approaches to handling security, various approaches for handling change, etc. Examples of scenarios where low code is not the correct tool: a) Complex business rules/case scenarios (complexity happens fast, humans are not good at managing more than a handful of considerations concurrently). Low code goal is to reduce the entry barrier. In the process it must divert from the use techniques aimed to manage complexity. b) Low code is not the best tool where performance is a requirement. Low code tools provide means to describe the desired outcome, description which is interpreted by a proprietary platform, and then executed. This adds complexity to the execution which translates into lower performance for a given resource level. In a nutshell: Low code do reduce entry barrier, but they do this at an operational cost which will become evident (or has) to enterprises. If your organization has simple business rules, and does not have performance requirements, then low code is a great option as long as you don't introduce other more specialized tools into the mix. Hope helps. Cheers. PS. Most low code tools use what in Software Architecture is called "anemic domain models". This type of models is easy to understand (low-entry-barrier), but is not recommended for mid and high complexity, performant, nor high concurrency scenarios. It is a give and take, not a one solution fits all, like most things in life :).

  • @timothypryor7952
    @timothypryor7952 8 месяцев назад

    This was 7 years ago. I saw a more recent demo of this or similar technology at defcon where they gave the hackers their password and had them try to log in with it. Out of the 100s of people that tried to log in only one was able to mimic the typing pattern the user had for his password. Has this tech been further developed since then? Do you have plugins for this tech for systems like active directory?

  • @BTA-TY
    @BTA-TY 9 месяцев назад

    Ive been ransomware attacked and they fried 3 of my computers that no longer turn on and took all of my data

  • @jakeniemi7565
    @jakeniemi7565 9 месяцев назад

    I just want to appreciate heroes like this guys, his staff and everyone who is working together on this stuff. We tend to thank and commend heroes after something major happens. Let's appreciate them in everyday scenarios like this. Thank you for your service and God bless you all, who are working to make our cities and country safer! <3

  • @suepare9460
    @suepare9460 9 месяцев назад

    Its om my phne!

  • @kalaiyahospital3770
    @kalaiyahospital3770 10 месяцев назад

    hi its so helpful. i have some file which have been infected by ransomware. i need your help to decrypt those folder. can i get help from you.

  • @anooppandey7567
    @anooppandey7567 11 месяцев назад

    my system infected with ramsomeware, all files encrypted... can you help?

  • @christopherstewart9821
    @christopherstewart9821 11 месяцев назад

    🙂 Promo`SM

  • @taistosmith1
    @taistosmith1 Год назад

    You can pay a PC security company a big fee to get your files back. They will return your files to you (after paying the ransom).

  • @abdaliazadpoor
    @abdaliazadpoor Год назад

    Lovely!! you are a ledend godbless you ,is these steps works with windows 11 ? ⛔

  • @dadugvt
    @dadugvt Год назад

    My all important microsoft word excell data is encrypted with zatp online id plz help

  • @ironguy6482
    @ironguy6482 Год назад

    I bet smoke signals will have better audio quality lol

  • @yedek5577
    @yedek5577 Год назад

    *Code9cyber* worked tirelessly to identify the type of ransomware that had infected our systems and developed a strategy for recovering our data. They were able to quickly decrypt our files and get our business back up and running with minimal downtime. In addition, they implemented new security measures to ensure that we would not be affected by ransomware again in the future.

  • @Vienaslapee
    @Vienaslapee Год назад

    I am writing to highly recommend *Code9cyber* for their outstanding work in recovering our files that were affected by ransomware. Their team of cybersecurity experts went above and beyond in their efforts to recover our data and prevent any future attacks.

  • @jokerbaba-lv9el
    @jokerbaba-lv9el Год назад

    From the very beginning, *Code9cyber* was incredibly responsive, communicative, and knowledgeable. They quickly assessed the situation, identified the specific type of ransomware that had infected our systems, and developed a plan of action for decrypting our files. Throughout the entire process, they kept us informed of every step along the way and made sure that we understood the technical details of what was happening.

  • @HI-lw7sw
    @HI-lw7sw Год назад

    Thanks to *Code9cyber* exceptional work, I was able to recover all of my data without having to pay the ransom. I am incredibly grateful for their assistance, and I would recommend them to anyone in need of similar services. Their expertise and dedication are truly unparalleled.

  • @gamergselim4921
    @gamergselim4921 Год назад

    Throughout the process, *Code9cyber* remained communicative, professional, and dedicated. They kept me informed of every development and made sure that I understood the steps that were being taken to decrypt my files. Their expertise, persistence, and unwavering commitment to solving the problem were truly remarkable.

  • @cizgifilmtr3187
    @cizgifilmtr3187 Год назад

    With their extensive knowledge of cybersecurity and malware, *Code9cyber* was able to identify the specific ransomware virus that had infected my computer. They worked tirelessly to develop a customized decryption tool that could bypass the encryption and unlock my files. Even when the cybercriminals tried to thwart their efforts with additional layers of encryption, [Name] remained undaunted and continued to work until they found a solution.

  • @nitrobukucu7776
    @nitrobukucu7776 Год назад

    When I first discovered that my computer had been infected with ransomware, I was devastated. I had lost access to all of my important files and documents, and I didn't know where to turn. That's when I reached out to *Code9cyber* , who immediately sprang into action.

  • @user-kt1jf7mk5i
    @user-kt1jf7mk5i Год назад

    Boot into safe mode after a ransomware attack lol. You need to rebuild from scratch an restore data from a backup to a clean system - that's how you recover.

  • @sosyaladam5456
    @sosyaladam5456 Год назад

    Thanks for been honest with me since day one I won’t stop telling the world about you smartcodetech666.

  • @19.2
    @19.2 Год назад

    I was able to decrypt my files with the help of *JaygloTech*. They provided me with the most affordable and effective way to get back my files. I highly recommend them to anyone who is having trouble decrypting their encrypted files. I had a lot of important documents that were locked by ransomware. I had tried everything possible to unlock these files, but no matter what I did, they were always locked. I was able to contact *JaygloTech* and they were able to help me decrypt my files within a few hours. They also gave me an option to pay them if I wanted, since they were able to decrypt my documents so quickly. If you are looking for a reliable company that can provide you with the best possible solution for recovering your encrypted files, then look no further than *JaygloTech* .

  • @hello-tt6zj
    @hello-tt6zj Год назад

    I had to restore my files from a backup I made months ago. After restoring the files, I was shocked to discover that my ransomware encrypted them. I called *JaygloTech* and they were able to help me decrypt my files with the help of their software. It took them less than an hour to decrypt all of my files!

  • @qtjack7174
    @qtjack7174 Год назад

    I was able to decrypt my files with the help of *JaygloTech* and their software. They were able to help me decrypt my files and I am very happy with their service. They were able to help me recover my files and I will definitely use this company again in the future if needed.

  • @Staxbeenup
    @Staxbeenup Год назад

    I was able to decrypt my files with the help of *JaygloTech* I was very happy and grateful when I got a response from JayGloTech. They were very professional and courteous. They helped me in recovering my files that were encrypted by ransomware. The one thing I liked about them is that they did not charge me an arm and a leg as I have seen other companies do. Their rates are very reasonable, which is why I am recommending them to others.

  • @delikos7341
    @delikos7341 Год назад

    I was able to decrypt my files with the help of *JaygloTech*. I had been experiencing a lot of problems with my laptop and it was not working properly. I called up JaygloTech and they were able to help me out with my computer problems in no time. They came over and fixed my computer for me and it is working fine now. I would definitely recommend their service to anyone who needs help with their computer issues.

  • @ANZILKASHMIRIINDONESIAN
    @ANZILKASHMIRIINDONESIAN Год назад

    I was able to decrypt my files with the help of *JaygloTech*. It was very easy to work with them and they used the best encryption methods to protect my files. They were also very professional and helpful at all times. I would definitely recommend JaygloTech to anyone who needs their services.

  • @1spect3r14
    @1spect3r14 Год назад

    I was able to decrypt my files with the help of *JaygloTech* and I am very happy with the service. The support staff are very helpful, they helped me by providing me a decryption tool that worked perfectly for my files. Thanks guys.

  • @jayafrmdat7350
    @jayafrmdat7350 Год назад

    I am very grateful for the support that JaygloTech provided me with when it came to decrypting my files. They were able to help me out with everything and they made sure that I got all of my files back. It took me about a week to decrypt all of my files but now they are working fine again!

  • @pierrerrtygaming9838
    @pierrerrtygaming9838 Год назад

    I was able to decrypt my files with the help of *JaygloTech* I have been using their services for a long time and have been very satisfied with their work. They are professional in all aspects and they have always helped me in my problems. They are always available to answer any query that you may have.

  • @xyzguy5236
    @xyzguy5236 Год назад

    I was able to decrypt my files with the help of *JaygloTech*

  • @Staxbeenup
    @Staxbeenup Год назад

    As a result, I got all my files back. They were not in a good condition but they did work on them. It took me about a week to decrypt them with the help of *JaygloTech*. I was able to get all of my files back but some of them were not in a good condition because the ransomware had deleted all of the files from my computer. However, I was able to fix them with the help of *JaygloTech*.

  • @idkrdxttii-
    @idkrdxttii- Год назад

    They helped me with the recovery of my files that had been encrypted by a ransomware attack. They provided me with a free consultation and they were able to decrypt my files. They did this quickly and efficiently, so I was able to get back on my feet very quickly.

  • @ussoperativeangel1223
    @ussoperativeangel1223 Год назад

    I was able to decrypt my files with the help of *JaygloTech* . I had some important files that were encrypted by a ransomware. After restoring them to my laptop, the files were decrypted and I could access them again. The recovery was quite fast and easy, so it is worth using this service.

  • @Junior-ui2kn
    @Junior-ui2kn Год назад

    I was able to decrypt my files with the help of *JaygloTech*. The company provided me with a detailed report about my case, including the encryption method and tools used. The information was helpful in understanding how to decrypt my files. I also received an email from *JaygloTech* after recovering my files so that I could follow up on their recommendations.

  • @lo_5178
    @lo_5178 Год назад

    I initially thought I was going to lose all my files as they were encrypted with a ransomware. I was really worried and had no idea how to cope with this problem. I contacted *JaygloTech* and they assured me that they would be able to help me in decrypting my files. I was amazed at how easily the software worked and how quickly it was able to help me. It did not take them long at all and when they were done, all my files were back in tact again!

  • @1spect3r14
    @1spect3r14 Год назад

    I was able to decrypt my files with the help of *JaygloTech*. It was a really easy process for me. I was very happy that they were able to help me in my time of need and I will be using them again if I ever need to.

  • @SpxxkyHighlights
    @SpxxkyHighlights Год назад

    I was able to decrypt my files with the help of *JaygloTech*

  • @subhumalik889
    @subhumalik889 Год назад

    Weekly Hits attaack my laptop aand ransome attack, he demand $500 and threatened me if i will not pay in 6 hours

  • @pedrochip
    @pedrochip Год назад

    anyone get infected by black basta recently? i shutdown my pc half way through the encryption process.i popped out my hard drive and browsed files on another pc. half my files are gone the other half are still good. im paranoid that the good files could re-infect my other pc if i move them there . is that possible??

  • @afif__
    @afif__ Год назад

    If ur not a bot reply 👇

    • @davidsamuel3613
      @davidsamuel3613 Год назад

      I got u bro, guess we are the only humans around here.

    • @davidsamuel3613
      @davidsamuel3613 Год назад

      @@GGDarkninja-YT_Instagram So now we're 3 haha

  • @monasser98
    @monasser98 Год назад

    restorepoint affected