Information and Asset Ownership
In this lesson, I describe asset ownership, why itis necessary, and owner responsibilities.
- Why ownership is important (00:09:00)
- Asset lifecycle (00:29:04)
- What is an Asset Owner (00:58:4)
- Change management (01:45:54)
- Configuration management (02:10:72)
- Software asset management (SAM) (02:30:14)
- Software licensing (03:13:56)
- Software library and approved product list (APL) (06:05:4)
- Monitoring and reporting (08:59:9)
Видео Information and Asset Ownership канала Tom Olzak
- Why ownership is important (00:09:00)
- Asset lifecycle (00:29:04)
- What is an Asset Owner (00:58:4)
- Change management (01:45:54)
- Configuration management (02:10:72)
- Software asset management (SAM) (02:30:14)
- Software licensing (03:13:56)
- Software library and approved product list (APL) (06:05:4)
- Monitoring and reporting (08:59:9)
Видео Information and Asset Ownership канала Tom Olzak
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Asset Classification](https://i.ytimg.com/vi/PivTJzvLgkc/default.jpg)
![Adventures in Security Episode 2 - 2014 Internet Security Threat Report](https://i.ytimg.com/vi/da28OBI5vuE/default.jpg)
![Communications and Network Security Part 22 – Remote Collaboration & Email](https://i.ytimg.com/vi/fRLvf17MSpo/default.jpg)
![Communications and Network Security Part 15 - Network Topologies](https://i.ytimg.com/vi/SS5qLqRD2_E/default.jpg)
![System Hardening - CISSP](https://i.ytimg.com/vi/B09dU3jEPzc/default.jpg)
![Cryptography Part 3: Asymmetric Encryption](https://i.ytimg.com/vi/aXF7RRPERHM/default.jpg)
![Communications and Network Security Part 3: Routing Protocols](https://i.ytimg.com/vi/qzYr-5HUSHM/default.jpg)
![Communications and Network Security Part 20 – Communication Channel and Authentication Protocols](https://i.ytimg.com/vi/k7J8DgX7PCM/default.jpg)
![Privileged Account and Session Management](https://i.ytimg.com/vi/R7BYCbJ57uo/default.jpg)
![Asset Handling Requirements - CISSP](https://i.ytimg.com/vi/f99RUQ136bE/default.jpg)
![CMGT431_Week_1_Lecture](https://i.ytimg.com/vi/C0FBByIX8BA/default.jpg)
![Validate Computing Device Integrity](https://i.ytimg.com/vi/0kkmHcYCyZQ/default.jpg)
![Data Security Controls Part 1: Frameworks](https://i.ytimg.com/vi/DC_K2ieHpRs/default.jpg)
![Cryptography Part 1 - History](https://i.ytimg.com/vi/-lb95I9A6Sc/default.jpg)
![Data States and Protection - CISSP](https://i.ytimg.com/vi/x4iE8GVV6sY/default.jpg)
![Protecting Data Integrity with Backups](https://i.ytimg.com/vi/7ioTa_sulcw/default.jpg)
![Identity Use and Identity Lifecycle](https://i.ytimg.com/vi/pbjs9jVbgAc/default.jpg)
![Communications and Network Security Part 23 – Remote Access Security](https://i.ytimg.com/vi/j-0iv5ch8Lw/default.jpg)
![Cryptography Part 4: Hashing](https://i.ytimg.com/vi/WYtCpJ6sczc/default.jpg)
![Episode 6: Critical Infrastructure Security](https://i.ytimg.com/vi/W_398tN3X_Q/default.jpg)