Похожие видео
array(20) {
["15rVU_meUlk"]=>
object(stdClass)#6929 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "15rVU_meUlk"
["related_video_title"]=>
string(65) "Webinar: How to overcome your data security compliance challenges"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["tvd1MUf3aHE"]=>
object(stdClass)#6934 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "tvd1MUf3aHE"
["related_video_title"]=>
string(67) "ISO 27001:2022 Implementation: From Start to Finish with Case Study"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["Vs_jXSKByq4"]=>
object(stdClass)#6927 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Vs_jXSKByq4"
["related_video_title"]=>
string(59) "Introduction to ISO 27001 (Information Security Management)"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["baLMV4TJJDM"]=>
object(stdClass)#6936 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "baLMV4TJJDM"
["related_video_title"]=>
string(69) "What are the practical steps to conducting an ISO 27701 gap analysis?"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["awLn7yZDKXs"]=>
object(stdClass)#6921 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "awLn7yZDKXs"
["related_video_title"]=>
string(76) "Webinar: Business Continuity Management: Impact Analysis and Risk Assessment"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["Ll43qU3Ov8c"]=>
object(stdClass)#6923 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Ll43qU3Ov8c"
["related_video_title"]=>
string(173) "SHAZAM Top 50🏖️Лучшая Музыка 2025🏖️Зарубежные песни Хиты🏖️Популярные Песни Слушать Бесплатно #40"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
NULL
}
["5odHebVjLz8"]=>
object(stdClass)#6925 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5odHebVjLz8"
["related_video_title"]=>
string(178) "Липсиц: ГОТОВЬТЕСЬ К СТРАШНОМУ! БЮДЖЕТ РУХНУЛ: ЦБ НАПЕЧАТАЛ 3 ТРЛН! В КРЕМЛЕ БОЯТСЯ ДЕФОЛТА И КРАХА"
["posted_time"]=>
string(20) "21 час назад"
["channelName"]=>
NULL
}
["cUvMIOdaSBs"]=>
object(stdClass)#6937 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "cUvMIOdaSBs"
["related_video_title"]=>
string(42) "Conducting a cybersecurity risk assessment"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["qwosU7e9mqc"]=>
object(stdClass)#6915 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "qwosU7e9mqc"
["related_video_title"]=>
string(154) "Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности"
["posted_time"]=>
string(25) "2 месяца назад"
["channelName"]=>
NULL
}
["RDgH8YSW4-U"]=>
object(stdClass)#6935 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "RDgH8YSW4-U"
["related_video_title"]=>
string(57) "ЗЕЛЕНСКИЙ ВСЕ УКРАЛ? | #Панченко"
["posted_time"]=>
string(24) "15 часов назад"
["channelName"]=>
NULL
}
["7xiPbAJxwEQ"]=>
object(stdClass)#6928 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7xiPbAJxwEQ"
["related_video_title"]=>
string(131) "Путина ждет жестокая расплата / Миндичгейт / Эпштейнгейт /№1044/ Юрий Швец"
["posted_time"]=>
string(23) "8 часов назад"
["channelName"]=>
NULL
}
["T01ldxij-yY"]=>
object(stdClass)#6938 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "T01ldxij-yY"
["related_video_title"]=>
string(105) "Нефть уже по $36... НАЕМНИКАМ ЧЕМ БУДЕМ ПЛАТИТЬ, ГУЛЬДЕНАМИ?!"
["posted_time"]=>
string(24) "15 часов назад"
["channelName"]=>
NULL
}
["zU0782vbYPc"]=>
object(stdClass)#6922 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "zU0782vbYPc"
["related_video_title"]=>
string(61) "Webinar: Business Continuity Management | How to get started?"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["_pL8Ik9fFfg"]=>
object(stdClass)#6920 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_pL8Ik9fFfg"
["related_video_title"]=>
string(84) "Cyber Essentials Plus Technical Deep Dive How to Avoid Common Pitfalls in the Audit"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["j890UTSyGS8"]=>
object(stdClass)#6918 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "j890UTSyGS8"
["related_video_title"]=>
string(69) "Implementing a Quantitative Cyber-Risk Framework: A FinSrv Case Study"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["LjZ4kedeEss"]=>
object(stdClass)#6919 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "LjZ4kedeEss"
["related_video_title"]=>
string(56) "Information Security Management Systems ISMS (ISO 27001)"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["5kDmCHZCPVw"]=>
object(stdClass)#6916 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5kDmCHZCPVw"
["related_video_title"]=>
string(50) "Conducting an Information Security Risk Assessment"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
NULL
}
["_uCmvfOhR_E"]=>
object(stdClass)#6917 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_uCmvfOhR_E"
["related_video_title"]=>
string(70) "How to Present Cyber Security Risk to Senior Leadership | SANS Webcast"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
NULL
}
["krrIo3b59qo"]=>
object(stdClass)#6905 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "krrIo3b59qo"
["related_video_title"]=>
string(41) "ISO 27001: How We Got ISO 27001 Certified"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["lQ7Nl2Y6Btk"]=>
object(stdClass)#6906 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lQ7Nl2Y6Btk"
["related_video_title"]=>
string(41) "ISO 27001 Lead Implementation Masterclass"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
}
Webinar: How to overcome your data security compliance challenges
ISO 27001:2022 Implementation: From Start to Finish with Case Study
Introduction to ISO 27001 (Information Security Management)
What are the practical steps to conducting an ISO 27701 gap analysis?
Webinar: Business Continuity Management: Impact Analysis and Risk Assessment
SHAZAM Top 50🏖️Лучшая Музыка 2025🏖️Зарубежные песни Хиты🏖️Популярные Песни Слушать Бесплатно #40
Липсиц: ГОТОВЬТЕСЬ К СТРАШНОМУ! БЮДЖЕТ РУХНУЛ: ЦБ НАПЕЧАТАЛ 3 ТРЛН! В КРЕМЛЕ БОЯТСЯ ДЕФОЛТА И КРАХА
Conducting a cybersecurity risk assessment
Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности
ЗЕЛЕНСКИЙ ВСЕ УКРАЛ? | #Панченко
Путина ждет жестокая расплата / Миндичгейт / Эпштейнгейт /№1044/ Юрий Швец
Нефть уже по $36... НАЕМНИКАМ ЧЕМ БУДЕМ ПЛАТИТЬ, ГУЛЬДЕНАМИ?!
Webinar: Business Continuity Management | How to get started?
Cyber Essentials Plus Technical Deep Dive How to Avoid Common Pitfalls in the Audit
Implementing a Quantitative Cyber-Risk Framework: A FinSrv Case Study
Information Security Management Systems ISMS (ISO 27001)
Conducting an Information Security Risk Assessment
How to Present Cyber Security Risk to Senior Leadership | SANS Webcast
ISO 27001: How We Got ISO 27001 Certified
ISO 27001 Lead Implementation Masterclass