Companies Home Search Profile

Scaling Your Cybersecurity and Privacy Program

Focused View

Nishant Bhajaria

1:23:12

98 View
  • 01 - Protecting through growth and innovation.mp4
    01:27
  • 02 - Why you need a scalable cybersecurity program.mp4
    03:09
  • 03 - Helping engineers scale cybersecurity.mp4
    03:08
  • 01 - Why risk identification is critical.mp4
    03:11
  • 02 - How to implement asset management.mp4
    03:26
  • 03 - Compliance and governance as risk identtification.mp4
    03:51
  • 04 - M&A security due diligence and integration.mp4
    03:52
  • 05 - Risk analysis.mp4
    03:59
  • 06 - Third-party risk management.mp4
    03:20
  • 01 - Identity management and access control.mp4
    03:47
  • 02 - Awareness and training.mp4
    03:36
  • 03 - Data privacy.mp4
    03:43
  • 04 - Security architecture design.mp4
    02:44
  • 05 - Vulnerability management.mp4
    02:58
  • 06 - Patch management.mp4
    03:34
  • 07 - Product security.mp4
    04:23
  • 08 - Cloud security.mp4
    04:16
  • 09 - Infrastructure security.mp4
    03:51
  • 01 - Threat intelligence and hunting.mp4
    04:00
  • 02 - Continuous security monitoring.mp4
    03:35
  • 03 - Insider threat.mp4
    03:24
  • 01 - Red team.mp4
    02:48
  • 02 - Incident response and management.mp4
    03:16
  • 03 - Business continuity and recovery.mp4
    02:46
  • 01 - A shifting target.mp4
    01:08
  • Description


    As cybersecurity becomes a key part of a company’s risk/trust strategy, it can become difficult to adapt and scale such a program. In this course, Nishant Bhajaria helps companies design an automation-powered and data-driven cybersecurity program.

    Join Nishant as he shows you how to: categorize cybersecurity into four key dimensions; identify, protect, detect, and recover when it comes to security risk; identify strengths and gaps for various cybersecurity initiatives; build a cybersecurity capability maturity model for your business; categorize your company’s capabilities along the spectrum of basic, advanced and leading; and more. If you’re trying to figure out where and how to invest your cybersecurity resources, this course can help you build better security capabilities and measure their effectiveness for audits and assessments—thereby building trust with customers while also improving your compliance posture.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Nishant Bhajaria
    Nishant Bhajaria
    Instructor's Courses
    I am a cybersecurity and privacy executive, and have built teams and programs to help achieve these goals. I typically serve as a vital link between legal, engineering and C-level leadership to ensure that the company's products help protect user data and secure customer trust. This means that the impact of my teams ranges from building (or deprecating) product functionality, processes, artifacts and policy; and then, optimizing the program so that data protection does not impede innovation. I have been in this space long enough to remember when a C-level executive asked me at a presentation "why do we need to invest so much in security and privacy?"
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 25
    • duration 1:23:12
    • Release Date 2022/12/11