Prabh Nair

Prabh Nair
Prabh Nair
Latest episode

82 episodes

  • Prabh Nair

    Implementing BCMS ISO22301 in 60 Days Made EASY

    24/12/2025 | 1h 22 mins.

    End-to-End Practical Implementation of ISO 22301 (BCMS 22301) — this is the first complete 60-day roadmap that takes you from kickoff to certification with real-world templates, playbooks, and audit-ready evidence.BCP Introductionhttps://www.youtube.com/watch?v=qKFPa1Ce9U4&pp=ygUJYmNwIHByYWJoIn this video, I walks you through the Business Continuity Management System (BCMS) implementation journey using the ISO 22301:2019 standard. Unlike theory-based content, this is a step-by-step practical guide with activities, deliverables, and documentation for every stage.🔑 What You’ll LearnWhat ISO 22301 and BCMS actually mean for organizations10 ISO 22301 clauses explained in a practical wayDay-by-day implementation roadmap (kickoff to certification)Business Impact Analysis (BIA) workshops, risk assessments, strategiesCrisis Management, Communication, DR, and Function Continuity PlansHow to design, test, and improve your BCMS lifecycleInternal audit, management review, and certification prep explainedReal evidence examples: policies, RACI, BIA sheets, risk registers, CAPA logs🛠 Who This Video Is ForCISOs, BCM managers, compliance officers, and consultantsOrganizations preparing for ISO 22301 certificationStudents and professionals building career skills in BCMSAnyone seeking a practical guide beyond theory📌 Why WatchMost BCMS/ISO 22301 videos stay theoretical. This is the first end-to-end practical roadmap that shows you exactly what to do each day for 60 days — from kickoff to Stage 2 audit.Who this is for:CISOs, Deputy CISOs, Heads of Security, aspiring leaders, security architects, and SOC managers who need practical leadership tactics, not theory.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#BCMS #ISO22301 #ISO22301Implementation#BCMSRoadmap #ISO22301Certification#BusinessContinuity #BusinessContinuityManagement#BCMSImplementation #ISO22301Training#BCMSAudit #ISOCertification#BCMSDocumentation #BusinessImpactAnalysis#ISO22301PracticalGuide #BCMS22301#ISOStandards#DisasterRecovery#CrisisManagement#ResilienceEngineering#PrabhNair

  • Prabh Nair

    How to Build an OT Security Program from Scratch?

    23/12/2025 | 1h 2 mins.

    Launch your Operational Technology (OT) Security Program the right way. In this Master Class podcast, we walk through every critical step for securing industrial control systems, SCADA networks, and IIoT devices—without shutting down production.Video Producer = Mukul UjjainPodcast Coordinator = Shreya Mrinal Speaker Profile = https://www.linkedin.com/in/shivkataria/Link to His Youtube Channelhttps://www.youtube.com/@UCi5DRDiUgcE6YuezxrYoJQA https://topmate.io/shiv_katariaWHAT YOU’LL LEARNThe very first action to take when starting OT security from zeroKey differences between OT security programs and traditional IT programsSmart asset‑visibility tactics for legacy, unscannable PLCs and RTUsWhen and how to map controls to IEC 62443 and NIST CSF for OT environmentsTop five technical controls to deploy in Year 1 (network segmentation, access control, backup, patch governance, anomaly detection)Safe logging and monitoring options that avoid process interruptionsWHY THIS MATTERS• Industrial attacks like TRITON and Colonial Pipeline prove OT is a prime target• Most plants still run 1990s hardware with no patches, making visibility job #1• Early alignment to IEC 62443 or NIST CSF slashes audit pain and insurance costsCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#OTSecurity #IndustrialCyberSecurity #IEC62443 #NISTCSF #SCADASecurity #OTMasterClass

  • Prabh Nair

    𝐇𝐨𝐰 𝐑𝐮𝐬𝐢𝐚𝐧 𝐀𝐢𝐫𝐥𝐢𝐧𝐞 𝐇𝐚𝐜𝐤𝐞𝐝

    22/12/2025 | 3 mins.

    Aeroflot Cyber Meltdown 🇷🇺✈️ — 4‑Minute Breakdown in Simple English (Indian Lens)On 28 July 2025 Moscow’s Sheremetyevo boards flipped from ON TIME ➡️ CANCELLED as pro‑Ukraine hackers Silent Crow and Belarusian Cyber Partisans wiped 7 000 + servers and crippled Russia’s largest airline. In four minutes you’ll learn how one leaked director‑level password snowballed into a full‑scale aviation crisis—and what CISOs can do to prevent the next runway shutdown.

  • Prabh Nair

    Cyber Warfare Explained: How Nations Fight Digital Wars

    22/12/2025 | 14 mins.

    When you hear “hacker,” you imagine someone in a dark hoodie. But the true players in today’s conflict are nations — turning code into weapons, infrastructure into battlegrounds, and silence into power. This is cyberwarfare — and it’s shaping the next global frontiers.00:00 - 00:38 - Introduction 00:38 – 02:20 – What is Cyber Warfare?02:20 – 02:40 - How the country get ready for this kind of a cyber conflict?02:40 – 05:02 - Plan/Doctrine05:02 – 06:54 – Team06:54 – 09:38 – Tool09:38 – 11:18 - Getting Ready/Pre-Positioning11:18 – 13:20 - Practice/Integration13:20 – 14:19 - Future Role of AIWhat You’ll DiscoverThe chilling story of the Ukrainian blackout attacks — malware used to open circuit breakers remotelyThe five pillars of national cyber power: Plan, Team, Tools, Presence & PracticeHow zero-day exploits like EternalBlue were weaponized, leaked, and deployed globally“Pre-positioning” — the art of silently embedding malware in critical systemsAI’s role in cyber conflict — how attackers and defenders both gain from itCase studies: Pushdo, NotPetya, power grid hacks, and the dark evolution of malwareStrategic insight: managing politics, doctrine, and cyber investmentWhy This Video MattersCyberwarfare isn’t sci-fi. It’s here, now, and under your world. Our banking, power, water, and banking systems — they all sit on fragile code. If you care about privacy, infrastructure, or tech sovereignty, this video is your wake-up call.Think about this: the bomb that tampers with your electricity bill isn’t dropped — it’s compiled. And the key to decrypting war may lie in exploiting a tiny, unseen software bug.Threathunting Introductionhttps://www.youtube.com/watch?v=n97tgFcRZg8&t=1036s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3Dhttps://www.youtube.com/watch?v=phq3FL-f1Ug&t=811s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3DPractical Threat Huntinghttps://www.youtube.com/watch?v=RlZ4qhC5f-c&t=803s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3DSOC Analyst Road Maphttps://www.youtube.com/watch?v=KxVEJ1GPgss&t=364s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3D#Cyberwarfare #NationStateHacking #ZeroDay #MalwareEvolution #UkraineHack #CyberWeapons #ModernWar #ThreatIntelligence #InfrastructureAttack #AIDefense #CyberConflict

  • Prabh Nair

    Cyber Warfare Explained: How Nations Fight Digital Wars

    18/12/2025 | 14 mins.

    When you hear “hacker,” you imagine someone in a dark hoodie. But the true players in today’s conflict are nations — turning code into weapons, infrastructure into battlegrounds, and silence into power. This is cyberwarfare — and it’s shaping the next global frontiers.What You’ll DiscoverThe chilling story of the Ukrainian blackout attacks — malware used to open circuit breakers remotelyThe five pillars of national cyber power: Plan, Team, Tools, Presence & PracticeHow zero-day exploits like EternalBlue were weaponized, leaked, and deployed globally“Pre-positioning” — the art of silently embedding malware in critical systemsAI’s role in cyber conflict — how attackers and defenders both gain from itCase studies: Pushdo, NotPetya, power grid hacks, and the dark evolution of malwareStrategic insight: managing politics, doctrine, and cyber investmentWhy This Video MattersCyberwarfare isn’t sci-fi. It’s here, now, and under your world. Our banking, power, water, and banking systems — they all sit on fragile code. If you care about privacy, infrastructure, or tech sovereignty, this video is your wake-up call.Think about this: the bomb that tampers with your electricity bill isn’t dropped — it’s compiled. And the key to decrypting war may lie in exploiting a tiny, unseen software bug.Threathunting Introductionhttps://www.youtube.com/watch?v=n97tgFcRZg8&t=1036s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3Dhttps://www.youtube.com/watch?v=phq3FL-f1Ug&t=811s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3DPractical Threat Huntinghttps://www.youtube.com/watch?v=RlZ4qhC5f-c&t=803s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3DSOC Analyst Road Maphttps://www.youtube.com/watch?v=KxVEJ1GPgss&t=364s&pp=ygUUdGhyZWF0IGh1bnRpbmcgcHJhYmg%3D#Cyberwarfare #NationStateHacking #ZeroDay #MalwareEvolution #UkraineHack #CyberWeapons #ModernWar #ThreatIntelligence #InfrastructureAttack #AIDefense #CyberConflict

More Technology podcasts

About Prabh Nair

Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou
Podcast website

Listen to Prabh Nair, Search Engine and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.2.1 | © 2007-2025 radio.de GmbH
Generated: 12/26/2025 - 5:26:33 AM