Похожие видео
array(10) {
[0]=>
object(stdClass)#5182 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "CCej6_43Xts"
["related_video_title"]=>
string(40) "Cybersecurity Risk: How do I measure it?"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(11) "Optic Cyber"
}
[1]=>
object(stdClass)#5155 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "WrAecu8q82U"
["related_video_title"]=>
string(48) "What Changed? - NIST Cybersecurity Framework 2.0"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(11) "Optic Cyber"
}
[2]=>
object(stdClass)#5180 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "k36LmS_3bH0"
["related_video_title"]=>
string(43) "Understanding Cybersecurity Risk Management"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(23) "SANS Security Awareness"
}
[3]=>
object(stdClass)#5187 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "nGj2m2Aij8k"
["related_video_title"]=>
string(44) "What Changed? - NIST SP 800-171 Rev2 to Rev3"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(11) "Optic Cyber"
}
[4]=>
object(stdClass)#5166 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "34BtwcL7Mkg"
["related_video_title"]=>
string(77) "How To Manage Security Risks & Threats | Google Cybersecurity Certificate"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(26) "Google Career Certificates"
}
[5]=>
object(stdClass)#5184 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "9D_OwDKwbkA"
["related_video_title"]=>
string(61) "What Is a Cybersecurity Risk Assessment (and HOW TO DO THEM!)"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(32) "Simply Cyber - Gerald Auger, PhD"
}
[6]=>
object(stdClass)#5179 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[7]=>
object(stdClass)#5189 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ImAbJQ58EQw"
["related_video_title"]=>
string(51) "Do I Measure Up? - NIST Cybersecurity Framework 2.0"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(11) "Optic Cyber"
}
[8]=>
object(stdClass)#5165 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Nc8Pxx24f-k"
["related_video_title"]=>
string(120) "Аксиома выбора: как Георг Кантор чуть не сломал математику [Veritasium]"
["posted_time"]=>
string(23) "7 часов назад"
["channelName"]=>
string(10) "Vert Dider"
}
[9]=>
object(stdClass)#5183 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_uCmvfOhR_E"
["related_video_title"]=>
string(70) "How to Present Cyber Security Risk to Senior Leadership | SANS Webcast"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(14) "SANS Institute"
}
}
Cybersecurity Risk: How do I measure it?
What Changed? - NIST Cybersecurity Framework 2.0
Understanding Cybersecurity Risk Management
What Changed? - NIST SP 800-171 Rev2 to Rev3
How To Manage Security Risks & Threats | Google Cybersecurity Certificate
What Is a Cybersecurity Risk Assessment (and HOW TO DO THEM!)
Разведчик о том, как использовать людей
Do I Measure Up? - NIST Cybersecurity Framework 2.0
Аксиома выбора: как Георг Кантор чуть не сломал математику [Veritasium]
How to Present Cyber Security Risk to Senior Leadership | SANS Webcast