<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Videos RSS Feed]]></title>
        <link>https://www.cshub.com/rss/videos</link>
        <description><![CDATA[ Cyber Security Hub ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:55:20 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/videos" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Preparing for the worst: Strategies for resilience pre &amp; post malware and ransom...]]></title>
                <link>https://www.cshub.com/malware/videos/preparing-for-worst-strategies-for-resilience?utm_medium=RSS</link>
                <description><![CDATA[ Watch this webinar for best practices on evading sophisticated cyber adversaries. Learn how to prepare for prevalent malware and ransomware attacks that not only pose significant financial risks but a... ]]></description>
                <author><![CDATA[ doug.witschi@afp.gov.au (Doug Witschi) ]]></author>
                <guid>https://www.cshub.com/malware/videos/preparing-for-worst-strategies-for-resilience?utm_medium=RSS</guid>
                <pubDate>Thu, 07 Dec 2023 09:58:58 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Partnering with your stakeholders to uplift your cyber security posture]]></title>
                <link>https://www.cshub.com/security-strategy/videos/partnering-with-your-stakeholders-to-uplift-your-cyber-security-posture?utm_medium=RSS</link>
                <description><![CDATA[ Advice and examples for maintaining the balance of addressing risks against business priorities ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/videos/partnering-with-your-stakeholders-to-uplift-your-cyber-security-posture?utm_medium=RSS</guid>
                <pubDate>Tue, 12 Sep 2023 15:09:04 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Building a robust framework for critical infrastructure resilience]]></title>
                <link>https://www.cshub.com/security-strategy/videos/building-a-robust-framework-for-critical-infrastructure-resilience?utm_medium=RSS</link>
                <description><![CDATA[ How to tailor a framework to the risks faced by your organization and its critical infrastructure ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/videos/building-a-robust-framework-for-critical-infrastructure-resilience?utm_medium=RSS</guid>
                <pubDate>Tue, 12 Sep 2023 15:18:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Turning cybersecurity awareness into action]]></title>
                <link>https://www.cshub.com/security-strategy/videos/turning-cybersecurity-awareness-into-action?utm_medium=RSS</link>
                <description><![CDATA[ Embracing the innovative, 'assumed-compromised' approach to cyber resilience ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/videos/turning-cybersecurity-awareness-into-action?utm_medium=RSS</guid>
                <pubDate>Tue, 12 Sep 2023 15:23:56 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Address security gaps to better manage third-party risk]]></title>
                <link>https://www.cshub.com/attacks/videos/address-security-gaps-to-better-manage-third-party-risk?utm_medium=RSS</link>
                <description><![CDATA[ The best strategies and best practices for addressing security gaps and effectively managing third-party risk ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/attacks/videos/address-security-gaps-to-better-manage-third-party-risk?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Analysing the importance of human centric design in control and process design o...]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/analysing-the-importance-of-human-centric-design-in-control-and-process-design-of-cyber-security-2?utm_medium=RSS</link>
                <description><![CDATA[ How to use human-centric design to create controls and processes that are more effective and easier to use for employees ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/analysing-the-importance-of-human-centric-design-in-control-and-process-design-of-cyber-security-2?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Raising cyber awareness and assessing the behavioural impact]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/raising-cyber-awareness-and-assessing-the-behavioural-impact?utm_medium=RSS</link>
                <description><![CDATA[ Learn more about the behavioural implications of cyber security and the role we play in responsibility and accountability ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/raising-cyber-awareness-and-assessing-the-behavioural-impact?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Applying a comprehensive, mature, and measurable zero-trust program]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/applying-a-comprehensive-mature-and-measurable-zero-trust-program?utm_medium=RSS</link>
                <description><![CDATA[ How to support security tools with simple processes and great usability for maximum security efficacy ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/applying-a-comprehensive-mature-and-measurable-zero-trust-program?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Addressing the vulnerabilities in operational technology]]></title>
                <link>https://www.cshub.com/security-strategy/videos/addressing-the-vulnerabilities-in-operational-technology?utm_medium=RSS</link>
                <description><![CDATA[ How to monitor, inspect and enforce policy across the network infrastructure ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/videos/addressing-the-vulnerabilities-in-operational-technology?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Creating representative cyber security workforce]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/creating-representative-cyber-security-workforce?utm_medium=RSS</link>
                <description><![CDATA[ Why gender diversity is integral to cyber security and how to encourage it within the industry ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/creating-representative-cyber-security-workforce?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Discovering opportunities for automation in cyber security]]></title>
                <link>https://www.cshub.com/security-strategy/videos/discovering-opportunities-for-automation-in-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ How to take a holistic approach to automation with an emphasis on cross-functionality ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/security-strategy/videos/discovering-opportunities-for-automation-in-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Public cloud protection]]></title>
                <link>https://www.cshub.com/cloud/videos/public-cloud-protection?utm_medium=RSS</link>
                <description><![CDATA[ Discover cloud security best practices for legacy systems, driving a cyber secure company culture and security management ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/videos/public-cloud-protection?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
            </channel>
</rss>