CSO
CSO
  • 268
  • 562 440
How should software solution providers keep themselves and their enterprise clients safe?
John Qian - Chief Information Security Officer at Aviatrix - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about a vendor's role in managing supply chain risks, cloud security, and more.
Follow CSO for more Business IT and Web Security News!
------------------------------­----
SUBSCRIBE: ua-cam.com/users/CSOonline
FACEBOOK: CSOonline/
TWITTER: CSOonline
WEBSITE: www.csoonline.com/
Переглядів: 52

Відео

Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2)
Переглядів 192 місяці тому
Eric Nguyen - Industry Advisor (AI x Cyber Security) at the University of Canberra's Open Source Institute - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about supply chain risks to critical infrastructure, public-private partnerships, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: CSOonl...
Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1)
Переглядів 473 місяці тому
Eric Nguyen - Industry Advisor (AI x Cyber Security) at the University of Canberra's Open Source Institute - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about supply chain risks to critical infrastructure, governance, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: CSOonline/ TWITTER: twi...
Standard Chartered’s Alvaro Garrido on #cybersecurity in the financial services industry
Переглядів 423 місяці тому
Alvaro Garrido - Interim Group Chief Information Officer, Technology & Operations at Standard Chartered - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about security challenges in financial institutions, lessons from past incidents, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: CSOonline...
CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure
Переглядів 543 місяці тому
Dicky Wong - Head of Cyber Security and Technology Risk at New World Development - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about securing the new Kai Tak Sports Park, smart buildings, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: CSOonline/ TWITTER: CSOonline WEBSITE: ww...
CSO Executive Sessions: DocDoc’s Rubaiyyaat Aakbar on security technology
Переглядів 704 місяці тому
Rubaiyyaat Aakbar - Head of IT and Cybersecurity at DocDoc - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about new technology, artificial intelligence, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: CSOonline/ TWITTER: CSOonline WEBSITE: www.csoonline.com/
CSO Executive Sessions: Hong Kong Baptist University’s Allan Wong on security leadership
Переглядів 225 місяців тому
Allan Wong - Director of Information Technology at Hong Kong Baptist University - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about leadership, talent, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: CSOonline/ TWITTER: CSOonline WEBSITE: www.csoonline.com/
CSO Executive Sessions: Firdaus Juhari on safeguarding infrastructure in the telco industry
Переглядів 105 місяців тому
Mohammad Firdaus Juhari - Head of Digital Security at EDOTCO Group - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about the challenges of protecting critical infrastructure in the telecommunications industry, key lessons from cyber-attacks, and more. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonline FACEBOOK: C...
CSO Executive Sessions: Guardians of the Games - How to keep the Olympics and other events cybersafe
Переглядів 1096 місяців тому
Bryan Woodworth - Director of Solution Strategy at Aviatrix - joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about safeguarding the #olympics from cyber threats, operational technology and IoT considerations for critical infrastructure, and more. #cybersecurity #cybercrime #iot Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOonlin...
CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)
Переглядів 416 місяців тому
When it comes to healthcare, India trusts AIIMS. And when you maintain the IT backbone of this renowned institution, the stakes are unparalleled. We sit down with Dr Susil Kumar Meher, Head Health IT of AIIMS, to get the pulse on how medicine and IT come together to saves lives, how AI has been heralded by the institute, and more, in this episode of CSO Executive Sessions. Follow CSO for more B...
Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)
Переглядів 376 місяців тому
When it comes to healthcare, India trusts AIIMS. And when you maintain the IT backbone of this renowned institution, the stakes are unparalleled. We sit down with Dr Susil Kumar Meher, Head Health IT of AIIMS, to get the pulse on how medicine and IT come together to saves lives, how AI has been heralded by the institute, and more, in this episode of CSO Executive Sessions.
CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands
Переглядів 256 місяців тому
How does Bata espouse its tenets of quality and excellence when securing its cybersecurity frontiers? Do disruptions in supply chain hamper Bata's business and customer satisfaction? CHaranjit Batia, Head of Cybersecurity and CoE, lets us walk a mile in his shoes, in this episode of CSO Executive Sessions. Follow CSO for more Business IT and Web Security News! ­ SUBSCRIBE: ua-cam.com/users/CSOo...
Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands
Переглядів 217 місяців тому
How does Bata espouse its tenets of quality and excellence when securing its cybersecurity frontiers? Do disruptions in supply chain hamper Bata's business and customer satisfaction? Charanjit Batia, Head of Cybersecurity and COE, lets us walk a mile in his shoes, in this episode of CSO Executive Sessions.
CSO Executive Sessions: Data protection in Malaysia
Переглядів 397 місяців тому
CSO Executive Sessions: Data protection in Malaysia
CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas
Переглядів 367 місяців тому
CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas
Mrinal Kanti Roy, CISO, Cairn Oil and Gas
Переглядів 97 місяців тому
Mrinal Kanti Roy, CISO, Cairn Oil and Gas
Hilal Lone, CISO, Razorpay
Переглядів 167 місяців тому
Hilal Lone, CISO, Razorpay
CSO Executive Sessions: The new realities of the CISO role - whistleblowing and legal liabilities
Переглядів 618 місяців тому
CSO Executive Sessions: The new realities of the CISO role - whistleblowing and legal liabilities
CSO Executive Session India with Pradipta Kumar Patro, KEC International
Переглядів 308 місяців тому
CSO Executive Session India with Pradipta Kumar Patro, KEC International
Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International
Переглядів 278 місяців тому
Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International
CSO Executive Sessions: The personality of cybersecurity leaders
Переглядів 599 місяців тому
CSO Executive Sessions: The personality of cybersecurity leaders
CSO Executive Sessions: Tensions in the South China Sea and why the private sector should care
Переглядів 9310 місяців тому
CSO Executive Sessions: Tensions in the South China Sea and why the private sector should care
CSO Executive Sessions: 2024 International Women's Day special
Переглядів 4710 місяців тому
CSO Executive Sessions: 2024 International Women's Day special
CSO Executive Sessions ASEAN: Former convicted hacker Hieu Minh Ngo on blindspots in data protection
Переглядів 8911 місяців тому
CSO Executive Sessions ASEAN: Former convicted hacker Hieu Minh Ngo on blindspots in data protection
Preventing the Cracks from Becoming a Hole that Becomes a Crater
Переглядів 17Рік тому
Preventing the Cracks from Becoming a Hole that Becomes a Crater
Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data
Переглядів 166Рік тому
Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data
Reaping the Benefits of Security Metrics
Переглядів 29Рік тому
Reaping the Benefits of Security Metrics
CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison
Переглядів 27Рік тому
CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison
AI and Cybersecurity: Speed Bumps, Training, and Communication
Переглядів 77Рік тому
AI and Cybersecurity: Speed Bumps, Training, and Communication
CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University
Переглядів 46Рік тому
CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University

КОМЕНТАРІ

  • @RickR69
    @RickR69 4 місяці тому

    No. I shut that bitch down already.

  • @bruceschneier6283
    @bruceschneier6283 4 місяці тому

    Where can i read more about this?

  • @AmmarH413
    @AmmarH413 5 місяців тому

    In one word : backup

  • @dertreffer
    @dertreffer 5 місяців тому

    and even after all those years, the commentsection is still full of scambots the channelcreater doesnt give a F obviously

  • @jam_oga_boss
    @jam_oga_boss 6 місяців тому

    Swacktech en lG puede ayudar a eliminar el ransomware de su dispositivo.

  • @BenHermann-zo9wj
    @BenHermann-zo9wj 8 місяців тому

    The lack of comments to this video is a sure sign of head-in-the-sand mentality. People can't grasp the humongous dimension of these attacks, they don't value their own data privacy. Shaking my head in disbelief.

    • @_Radio69_
      @_Radio69_ 4 місяці тому

      Yeah, it's a pretty fucked up time we live in now. People would rather stay blissfully ignorant to the world laid out before them.

    • @Noidstradamus
      @Noidstradamus 3 місяці тому

      Most people don't even think about their privacy online. It never even occurs to them.

  • @strixx9014
    @strixx9014 10 місяців тому

    I was attacked with djvu, i suppose i deleted it because i downloaded some archives and they are not encrypted, but i dont have a backup of the same archives for recovery, what can i do? can i make a copy of an mp4 file and encrypt it to use as a sample? help please

  • @anjannaprince
    @anjannaprince 10 місяців тому

    wahhh bhai❤❤❤ mama agya

  • @shyamvagadiya649
    @shyamvagadiya649 Рік тому

    Hi, how can I scan the internet for a specific keyword, for example: my brand name and sort out the fraudulent domains?

  • @jjtalavera7906
    @jjtalavera7906 Рік тому

    Please notice me how about in onedrive account?

  • @orlandovillat
    @orlandovillat Рік тому

    I fully agree with the search for simplifications and its benefits. However, In relation to Low Code.... I see a contradiction in terms of search for simplification and use of Low Code tools. In my experience low code tools do not satisfy all scenarios, which translate into varied tooling environment. Varied tooling introduces various operational methodologies, various approaches to handling security, various approaches for handling change, etc. Examples of scenarios where low code is not the correct tool: a) Complex business rules/case scenarios (complexity happens fast, humans are not good at managing more than a handful of considerations concurrently). Low code goal is to reduce the entry barrier. In the process it must divert from the use techniques aimed to manage complexity. b) Low code is not the best tool where performance is a requirement. Low code tools provide means to describe the desired outcome, description which is interpreted by a proprietary platform, and then executed. This adds complexity to the execution which translates into lower performance for a given resource level. In a nutshell: Low code do reduce entry barrier, but they do this at an operational cost which will become evident (or has) to enterprises. If your organization has simple business rules, and does not have performance requirements, then low code is a great option as long as you don't introduce other more specialized tools into the mix. Hope helps. Cheers. PS. Most low code tools use what in Software Architecture is called "anemic domain models". This type of models is easy to understand (low-entry-barrier), but is not recommended for mid and high complexity, performant, nor high concurrency scenarios. It is a give and take, not a one solution fits all, like most things in life :).

  • @timothypryor7952
    @timothypryor7952 Рік тому

    This was 7 years ago. I saw a more recent demo of this or similar technology at defcon where they gave the hackers their password and had them try to log in with it. Out of the 100s of people that tried to log in only one was able to mimic the typing pattern the user had for his password. Has this tech been further developed since then? Do you have plugins for this tech for systems like active directory?

  • @BTA-TY
    @BTA-TY Рік тому

    Ive been ransomware attacked and they fried 3 of my computers that no longer turn on and took all of my data

  • @jakeniemi7565
    @jakeniemi7565 Рік тому

    I just want to appreciate heroes like this guys, his staff and everyone who is working together on this stuff. We tend to thank and commend heroes after something major happens. Let's appreciate them in everyday scenarios like this. Thank you for your service and God bless you all, who are working to make our cities and country safer! <3

  • @suepare9460
    @suepare9460 Рік тому

    Its om my phne!

  • @kalaiyahospital3770
    @kalaiyahospital3770 Рік тому

    hi its so helpful. i have some file which have been infected by ransomware. i need your help to decrypt those folder. can i get help from you.

  • @anooppandey7567
    @anooppandey7567 Рік тому

    my system infected with ramsomeware, all files encrypted... can you help?

  • @christopherstewart9821
    @christopherstewart9821 Рік тому

    🙂 Promo`SM

  • @taistosmith1
    @taistosmith1 Рік тому

    You can pay a PC security company a big fee to get your files back. They will return your files to you (after paying the ransom).

  • @abdaliazadpoor
    @abdaliazadpoor Рік тому

    Lovely!! you are a ledend godbless you ,is these steps works with windows 11 ? ⛔

  • @dadugvt
    @dadugvt Рік тому

    My all important microsoft word excell data is encrypted with zatp online id plz help

  • @ironguy6482
    @ironguy6482 Рік тому

    I bet smoke signals will have better audio quality lol

  • @yedek5577
    @yedek5577 Рік тому

    *Code9cyber* worked tirelessly to identify the type of ransomware that had infected our systems and developed a strategy for recovering our data. They were able to quickly decrypt our files and get our business back up and running with minimal downtime. In addition, they implemented new security measures to ensure that we would not be affected by ransomware again in the future.

  • @Vienaslapee
    @Vienaslapee Рік тому

    I am writing to highly recommend *Code9cyber* for their outstanding work in recovering our files that were affected by ransomware. Their team of cybersecurity experts went above and beyond in their efforts to recover our data and prevent any future attacks.

  • @jokerbaba-lv9el
    @jokerbaba-lv9el Рік тому

    From the very beginning, *Code9cyber* was incredibly responsive, communicative, and knowledgeable. They quickly assessed the situation, identified the specific type of ransomware that had infected our systems, and developed a plan of action for decrypting our files. Throughout the entire process, they kept us informed of every step along the way and made sure that we understood the technical details of what was happening.

  • @HI-lw7sw
    @HI-lw7sw Рік тому

    Thanks to *Code9cyber* exceptional work, I was able to recover all of my data without having to pay the ransom. I am incredibly grateful for their assistance, and I would recommend them to anyone in need of similar services. Their expertise and dedication are truly unparalleled.

  • @gamergselim4921
    @gamergselim4921 Рік тому

    Throughout the process, *Code9cyber* remained communicative, professional, and dedicated. They kept me informed of every development and made sure that I understood the steps that were being taken to decrypt my files. Their expertise, persistence, and unwavering commitment to solving the problem were truly remarkable.

  • @cizgifilmtr3187
    @cizgifilmtr3187 Рік тому

    With their extensive knowledge of cybersecurity and malware, *Code9cyber* was able to identify the specific ransomware virus that had infected my computer. They worked tirelessly to develop a customized decryption tool that could bypass the encryption and unlock my files. Even when the cybercriminals tried to thwart their efforts with additional layers of encryption, [Name] remained undaunted and continued to work until they found a solution.

  • @nitrobukucu7776
    @nitrobukucu7776 Рік тому

    When I first discovered that my computer had been infected with ransomware, I was devastated. I had lost access to all of my important files and documents, and I didn't know where to turn. That's when I reached out to *Code9cyber* , who immediately sprang into action.

  • @X0295-m8t
    @X0295-m8t Рік тому

    Boot into safe mode after a ransomware attack lol. You need to rebuild from scratch an restore data from a backup to a clean system - that's how you recover.

  • @sosyaladam5456
    @sosyaladam5456 2 роки тому

    Thanks for been honest with me since day one I won’t stop telling the world about you smartcodetech666.

  • @19.2
    @19.2 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*. They provided me with the most affordable and effective way to get back my files. I highly recommend them to anyone who is having trouble decrypting their encrypted files. I had a lot of important documents that were locked by ransomware. I had tried everything possible to unlock these files, but no matter what I did, they were always locked. I was able to contact *JaygloTech* and they were able to help me decrypt my files within a few hours. They also gave me an option to pay them if I wanted, since they were able to decrypt my documents so quickly. If you are looking for a reliable company that can provide you with the best possible solution for recovering your encrypted files, then look no further than *JaygloTech* .

  • @hello-tt6zj
    @hello-tt6zj 2 роки тому

    I had to restore my files from a backup I made months ago. After restoring the files, I was shocked to discover that my ransomware encrypted them. I called *JaygloTech* and they were able to help me decrypt my files with the help of their software. It took them less than an hour to decrypt all of my files!

  • @qtjack7174
    @qtjack7174 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech* and their software. They were able to help me decrypt my files and I am very happy with their service. They were able to help me recover my files and I will definitely use this company again in the future if needed.

  • @Staxbeenup
    @Staxbeenup 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech* I was very happy and grateful when I got a response from JayGloTech. They were very professional and courteous. They helped me in recovering my files that were encrypted by ransomware. The one thing I liked about them is that they did not charge me an arm and a leg as I have seen other companies do. Their rates are very reasonable, which is why I am recommending them to others.

  • @delikos7341
    @delikos7341 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*. I had been experiencing a lot of problems with my laptop and it was not working properly. I called up JaygloTech and they were able to help me out with my computer problems in no time. They came over and fixed my computer for me and it is working fine now. I would definitely recommend their service to anyone who needs help with their computer issues.

  • @ANZILKASHMIRIINDONESIAN
    @ANZILKASHMIRIINDONESIAN 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*. It was very easy to work with them and they used the best encryption methods to protect my files. They were also very professional and helpful at all times. I would definitely recommend JaygloTech to anyone who needs their services.

  • @1spect3r14
    @1spect3r14 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech* and I am very happy with the service. The support staff are very helpful, they helped me by providing me a decryption tool that worked perfectly for my files. Thanks guys.

  • @jayafrmdat7350
    @jayafrmdat7350 2 роки тому

    I am very grateful for the support that JaygloTech provided me with when it came to decrypting my files. They were able to help me out with everything and they made sure that I got all of my files back. It took me about a week to decrypt all of my files but now they are working fine again!

  • @pierrerrtygaming9838
    @pierrerrtygaming9838 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech* I have been using their services for a long time and have been very satisfied with their work. They are professional in all aspects and they have always helped me in my problems. They are always available to answer any query that you may have.

  • @pvlbldnv
    @pvlbldnv 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*

  • @Staxbeenup
    @Staxbeenup 2 роки тому

    As a result, I got all my files back. They were not in a good condition but they did work on them. It took me about a week to decrypt them with the help of *JaygloTech*. I was able to get all of my files back but some of them were not in a good condition because the ransomware had deleted all of the files from my computer. However, I was able to fix them with the help of *JaygloTech*.

  • @idkrdxttii-
    @idkrdxttii- 2 роки тому

    They helped me with the recovery of my files that had been encrypted by a ransomware attack. They provided me with a free consultation and they were able to decrypt my files. They did this quickly and efficiently, so I was able to get back on my feet very quickly.

  • @ussoperativeangel1223
    @ussoperativeangel1223 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech* . I had some important files that were encrypted by a ransomware. After restoring them to my laptop, the files were decrypted and I could access them again. The recovery was quite fast and easy, so it is worth using this service.

  • @Junior-ui2kn
    @Junior-ui2kn 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*. The company provided me with a detailed report about my case, including the encryption method and tools used. The information was helpful in understanding how to decrypt my files. I also received an email from *JaygloTech* after recovering my files so that I could follow up on their recommendations.

  • @lo_5178
    @lo_5178 2 роки тому

    I initially thought I was going to lose all my files as they were encrypted with a ransomware. I was really worried and had no idea how to cope with this problem. I contacted *JaygloTech* and they assured me that they would be able to help me in decrypting my files. I was amazed at how easily the software worked and how quickly it was able to help me. It did not take them long at all and when they were done, all my files were back in tact again!

  • @1spect3r14
    @1spect3r14 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*. It was a really easy process for me. I was very happy that they were able to help me in my time of need and I will be using them again if I ever need to.

  • @SpxxkyHighlights
    @SpxxkyHighlights 2 роки тому

    I was able to decrypt my files with the help of *JaygloTech*

  • @Subhumalil07
    @Subhumalil07 2 роки тому

    Weekly Hits attaack my laptop aand ransome attack, he demand $500 and threatened me if i will not pay in 6 hours

  • @pedrochip
    @pedrochip 2 роки тому

    anyone get infected by black basta recently? i shutdown my pc half way through the encryption process.i popped out my hard drive and browsed files on another pc. half my files are gone the other half are still good. im paranoid that the good files could re-infect my other pc if i move them there . is that possible??