YouTube Videos

Compliance Risk

Pentesting and Vulnerability Management: Session Three – Mastering Threat Monitoring

Ongoing proactive management of your environment – how to use and sell vulnerability management So, you've done your pen test(s) and started the fixes, how do you monitor new threats and track your progress against the pen test recommendations.
Compliance Risk

Cross-Mapping: The Truth About Frameworks and Privacy

Discover the truth about cross-mapping frameworks and privacy in this insightful video. Learn why cross-mapping is not as straightforward as it seems and how Compliance Scorecard approaches it differently. Find out how to address CMMC requirements and explore the relationship between NIST catalog and control...