Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

ISACA's New AI Security Certification: Is It Worth It? | Keatron Evans & Kirsten Lora

Автор: Infosec

Загружено: 2025-10-06

Просмотров: 1602

Описание:

— Learn about ISACA AAISM training: https://www.infosecinstitute.com/cour...
— View course dates: https://www.infosecinstitute.com/cour...
— Download ISACA AI Policy Template: https://www.infosecinstitute.com/glob...

One in four CISOs has already experienced an AI-generated attack this year. Even more concerning? IBM's 2025 research found 63% of breached organizations had no AI policies in place — leaving them exposed to attacks that now cost U.S. organizations an average of $10.2 million.

Enter ISACA's Advanced in AI Security Management (AAISM) certification, the industry's answer to the AI security governance problem. Designed exclusively for CISM and CISSP holders, AAISM validates your ability to govern, assess and secure AI implementations at the enterprise level. Organizations with extensive AI security measures save $1.9 million in breach costs compared to those without — and this certification equips you to build that protection.

Join Kirsten Lora, VP Product at ISACA, and Keatron Evans, VP of Portfolio Product and AI Strategy at Infosec, to learn:

0:00 - Introduction: AI security challenges and adoption stats
3:45 - Poll: Do you have CISM or CISSP certification?
4:21 - Why CISM or CISSP is required for AAISM
5:40 - Deep dive: ISACA's new AAISM certification explained
9:09 - Three domains covered in the certification
12:18 - The 63% problem: Organizations without AI policies
14:55 - Building AI policies: Getting stakeholders involved
16:41 - Download: Free ISACA AI policy template
17:09 - Leadership pressure: Moving fast vs. security governance
21:01 - New AI risks and how to approach them differently
23:32 - First steps: Building an AI governance program
25:21 - AI skills: Does your team need an AI specialist?
26:30 - Career paths: New opportunities in AI security
29:00 - Infosec's AAISM training program overview
32:00 - Q&A: Use cases for selling AI governance to leadership
33:09 - Real-world threats: Deepfakes, phishing, and exploit development
35:20 - Technical background needed for AAISM
37:06 - What makes Infosec's training different
39:31 - Final thoughts on AI security management's importance

About Infosec
Infosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.

ISACA's New AI Security Certification: Is It Worth It? | Keatron Evans & Kirsten Lora

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Detecting AI Deception: How to Identify Deepfakes, Voice clones & AI Scams | Free Toolkit

Detecting AI Deception: How to Identify Deepfakes, Voice clones & AI Scams | Free Toolkit

Вы (пока) не отстаёте: как освоить ИИ за 17 минут

Вы (пока) не отстаёте: как освоить ИИ за 17 минут

AI Governance Masterclass: Build Responsible & Ethical AI Systems

AI Governance Masterclass: Build Responsible & Ethical AI Systems

AAISM Exam Explained! Everything You Need to Know About ISACA’s New AI Certification

AAISM Exam Explained! Everything You Need to Know About ISACA’s New AI Certification

Is AI Saving or Taking Jobs? Cybersecurity & Automation Impact

Is AI Saving or Taking Jobs? Cybersecurity & Automation Impact

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

NotebookLM: твой AI наставник в самообучение

NotebookLM: твой AI наставник в самообучение

Современные подсказки для агентов ИИ

Современные подсказки для агентов ИИ

Agentic AI workshop: Train your first cybersecurity model in 90 minutes | Free Training and Lab

Agentic AI workshop: Train your first cybersecurity model in 90 minutes | Free Training and Lab

Introducing the World’s First AI Assurance Certifications by ISACA!

Introducing the World’s First AI Assurance Certifications by ISACA!

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

Building ‍Security into AI – Tutorial

Building ‍Security into AI – Tutorial

AI Governance Simplified: From Zero to Pro

AI Governance Simplified: From Zero to Pro

CISSP vs CISM | Which Security Certification Is Right for You?

CISSP vs CISM | Which Security Certification Is Right for You?

Webinar: Actionable Security Policies for Cyber Defense

Webinar: Actionable Security Policies for Cyber Defense

Cybersecurity Trends for 2025 and Beyond

Cybersecurity Trends for 2025 and Beyond

Don't learn AI Agents without Learning these Fundamentals

Don't learn AI Agents without Learning these Fundamentals

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Networks

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]