Real Security Doctor/Real Security Management - The Course

  • £2,600

Real Security Management - The Course

  • Course
  • 94 Lessons
  • 90-day access

This is the online programme for Real Security Management. It goes into more practical detail on how to use the ideas than the book.

Contents

Introduction

1 Intro.mp4
2 Understanding Security.mp4
3 The CIA Triad is NOT security.mp4
4 The Dilemma of the Empty Room.mp4
5 The root of security.mp4
6 Understanding risk.mp4
7 Risk concepts - likelihood and probability.mp4
8 Risk concepts - appetite.mp4
9. Risk concepts - threat.mp4
10 Risk concepts - vulnerability.mp4
11 Risk concepts - impact.mp4
12 Risk and security.mp4
13 Risk and decision making.mp4
14 The global state of enterprise risk.mp4
15 The organisational response cycle.mp4
16 Replacing risk.mp4
17 The 2 great contexts of security practice.mp4
18 Security expectations.mp4
19 Why nobody wants security.mp4
20 Why hire security.mp4
21 Security and ethics.mp4
22 Organisational value.mp4
23 Dr D's 4 D's.mp4
24 Security relativity.mp4
25 Understanding fragility.mp4
26 The purpose of security.mp4
27 Security objectives.mp4
28 Redefining security.mp4
29 The 8 Security Virtues.mp4
30 Real Security Management Model.mp4
31 Calibration Questions.mp4

Prescription - Define

A1 Advisory on this section.mp4
A2 Intro to the Prescription.mp4
1.Define.mp4
1.1 Define - The Problem.mp4
1.2 Define -The Organisation.mp4
1.3 Define -The Spaces.mp4
1.4 Define - The Structures.mp4
1.5 Define - Stakeholders.mp4
1.6 Define - Finance.mp4
1.7 Define - Risk.mp4
1.8 Define - Tech and Data.mp4
1.9 Define - Objectives.mp4
1.10 Define - Strategy.mp4
1.12 Define - Business units.mp4
B Sidebar - Organisational Value.mp4
1.11 Define - Appetites.mp4
1.13 Define - The Drivers.mp4
1.14 Define - Security.mp4
1.15 Define - Bullshit.mp4
1.16 Define - The Relationship.mp4
1.17 Define - Protective Focus.mp4
1.18 Define - Reference Narratives.mp4
1.19 Define - Postures.mp4
C1 Sidebar Security Problem Statements.mp4
C2 Sidebar Consequence Modelling.mp4
1.20 Define - Requirements.mp4
1.21 Define - Constraints.mp4
1.22 Define - Documentation.mp4

Prescription - Analyse

2.0 Analyse - Intro .mp4
2.1 Analyse - The 2 Modes of Thinking.mp4
2.2 Analyse - Understanding Bias.mp4
2.3 Analyse - The 6 families.mp4
2.4 Analyse - 8 Core Techniques.mp4
2.5 Analyse - When to use Which Technique.mp4
2.6 Analyse - 5 Habits of Master Thinkers.mp4
2.7 Analyse - Analysis Groups.mp4
2.8 Analyse - Organisation.mp4
2.9 Analyse - Exploration.mp4
2.10 Analyse - Diagnostic.mp4
Sidebar Analyse - Understanding Hypotheses .mp4
2-10-1 Analyse - Diagnosis continued.mp4
2.11 Analyse - Reframing.mp4
2.12 Analyse - Foresight.mp4
2.13 Analyse - Decision Support.mp4
2.14 Analyse - NSE2C.mp4

Prescription - Prioritise

3.0 Prioritise

Protection - Control

4.1 Intro to Protection.mp4
4.2 The Reality of Control.mp4
4.3 The Spanish Circle.mp4
4.4 The Separation of Tasks.mp4
4.5 Understanding Controls.mp4
4.6 Condition Management.mp4
4.7 ISO27001.mp4
4.8 Your Protective Framework.mp4
4.9 Change.mp4

Protection - Monitor

5.0 Monitor.mp4
5.1 Insider Threat.mp4

Protection - Prepare

6.0 Prepare.mp4
Sidebar - Why nobody listens to security.mp4

Positioning - Envision

7.0 Positioning.mp4
7.1 Envision.mp4

Positioning - Strategise

8.0 Strategise.mp4

Positioning - Influence

9.0 Influence.mp4