Tandem, LLC

@TandemLLC - 27 本の動画

チャンネル登録者数 113人

Tandem, developed by CoNetrix, is a security and compliance software that provides a solution for managing information security and compliance. Tandem is des...

最近の動画

Since the FFIEC CAT is retiring, many institutions are now comparing cybersecurity frameworks. 1:53

Since the FFIEC CAT is retiring, many institutions are now comparing cybersecurity frameworks.

Building a Practical BCP for Your Financial Institution 1:05:10

Building a Practical BCP for Your Financial Institution

Replacing the FFIEC CAT: A Guide to Cybersecurity Frameworks 1:07:47

Replacing the FFIEC CAT: A Guide to Cybersecurity Frameworks

An Overview of the NCUA’s New Succession Planning Rule 57:56

An Overview of the NCUA’s New Succession Planning Rule

MSP or Software Due Dilligence? | Cybersecurity and Coffee 3:04

MSP or Software Due Dilligence? | Cybersecurity and Coffee

Should You Install All Security Patches Immediately? | Cybersecurity and Coffee 1:58

Should You Install All Security Patches Immediately? | Cybersecurity and Coffee

How Many Critical Vendors is Too Many? | Cybersecurity and Coffee 3:06

How Many Critical Vendors is Too Many? | Cybersecurity and Coffee

How Often Should You Review Vendors? | Cybersecurity and Coffee 2:53

How Often Should You Review Vendors? | Cybersecurity and Coffee

Who to Invite to Your Tabletop Exercise? | Cybersecurity and Coffee 2:39

Who to Invite to Your Tabletop Exercise? | Cybersecurity and Coffee

Should I Report A Known Incident? | Cybersecurity and Coffee 2:47

Should I Report A Known Incident? | Cybersecurity and Coffee

Tandem Vendor Management | Product Overview 3:24

Tandem Vendor Management | Product Overview

How to Manage Subcontractor Relationships | Cybersecurity and Coffee 3:12

How to Manage Subcontractor Relationships | Cybersecurity and Coffee

Should You have Redundant Vendors? | Cybersecurity and Coffee 2:59

Should You have Redundant Vendors? | Cybersecurity and Coffee

What is an IT Audit Risk Assessment 3:53

What is an IT Audit Risk Assessment

A Better Way for Collecting Due Diligence Documents from Vendors | Cybersecurity & Coffee 5:12

A Better Way for Collecting Due Diligence Documents from Vendors | Cybersecurity & Coffee

What is a GLBA Risk Assessment? | Cybersecurity & Coffee 4:21

What is a GLBA Risk Assessment? | Cybersecurity & Coffee

An Overview of the NCUA's Information Security Examination (ISE) 8:13

An Overview of the NCUA's Information Security Examination (ISE)

Should Your Organization Have Redundant Vendors for Critical Vendors? 1:29

Should Your Organization Have Redundant Vendors for Critical Vendors?

Vendor vs. 3rd Party | Cybersecurity & Coffee 2:22

Vendor vs. 3rd Party | Cybersecurity & Coffee

The Difference Between a BCP Event and an Incident 1:56

The Difference Between a BCP Event and an Incident

Policies vs. Standards vs. Controls vs. Procedures | Cybersecurity & Coffee 3:15

Policies vs. Standards vs. Controls vs. Procedures | Cybersecurity & Coffee

What To Focus on When Presenting Your Business Continuity Plan to the Board 1:54

What To Focus on When Presenting Your Business Continuity Plan to the Board

When Should I Report an Incident? | Cybersecurity & Coffee 3:15

When Should I Report an Incident? | Cybersecurity & Coffee

How Important Is Geographical Location for Business Continuity? 1:40

How Important Is Geographical Location for Business Continuity?

Tandem Incident Management | Product Overview 3:22

Tandem Incident Management | Product Overview

Areas Sometimes Excluded from Business Continuity Planning 2:11

Areas Sometimes Excluded from Business Continuity Planning

What to Expect in Your 2023 NCUA Exam | Cybersecurity & Coffee 2:42

What to Expect in Your 2023 NCUA Exam | Cybersecurity & Coffee

動画

Building a Practical BCP for Your Financial Institution 1:05:10

Building a Practical BCP for Your Financial Institution

72 回視聴 - 1 か月前

Replacing the FFIEC CAT: A Guide to Cybersecurity Frameworks 1:07:47

Replacing the FFIEC CAT: A Guide to Cybersecurity Frameworks

287 回視聴 - 3 か月前

An Overview of the NCUA’s New Succession Planning Rule 57:56

An Overview of the NCUA’s New Succession Planning Rule

125 回視聴 - 4 か月前

MSP or Software Due Dilligence? | Cybersecurity and Coffee 3:04

MSP or Software Due Dilligence? | Cybersecurity and Coffee

15 回視聴 - 9 か月前

Should You Install All Security Patches Immediately? | Cybersecurity and Coffee 1:58

Should You Install All Security Patches Immediately? | Cybersecurity and Coffee

13 回視聴 - 10 か月前

How Many Critical Vendors is Too Many? | Cybersecurity and Coffee 3:06

How Many Critical Vendors is Too Many? | Cybersecurity and Coffee

30 回視聴 - 11 か月前

How Often Should You Review Vendors? | Cybersecurity and Coffee 2:53

How Often Should You Review Vendors? | Cybersecurity and Coffee

40 回視聴 - 1 年前

Who to Invite to Your Tabletop Exercise? | Cybersecurity and Coffee 2:39

Who to Invite to Your Tabletop Exercise? | Cybersecurity and Coffee

43 回視聴 - 1 年前

Should I Report A Known Incident? | Cybersecurity and Coffee 2:47

Should I Report A Known Incident? | Cybersecurity and Coffee

34 回視聴 - 1 年前

Tandem Vendor Management | Product Overview 3:24

Tandem Vendor Management | Product Overview

199 回視聴 - 1 年前

How to Manage Subcontractor Relationships | Cybersecurity and Coffee 3:12

How to Manage Subcontractor Relationships | Cybersecurity and Coffee

59 回視聴 - 1 年前

Should You have Redundant Vendors? | Cybersecurity and Coffee 2:59

Should You have Redundant Vendors? | Cybersecurity and Coffee

38 回視聴 - 1 年前