Charlie Maclean-Bristol looks at the risk of a cyber-attack and the importance of reviewing your vulnerability to water, wastewater and electricity loss.
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider
In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may…
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability.
This chapter will help you to:
Understand the relationship between cyber threats and vulnerabilities.
Understand how to identify…
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy Templates
– Additional New Compliance Documents
– 60+ New Information Security Policies
In this chapter you will discover:
• An overview of the concept of an “observation.”
• The primary elements included in the observation as well as its format.
• Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…
In this chapter you will discover:
• An overview of the concept of an “observation.”
• The primary elements included in the observation as well as its format.
• Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy Templates
– Additional New Compliance Documents
– 60+ New Information Security Policies
Check out this book review from Security Management Magazine, a publication of ASIS International on Cybersecurity Law, Standards, and Regulations, Second Edition, by Tari Schreider
Reviewed by Ronald L. Mendell, 1 September 2020
Click here for the Print Issue: September 2020
Click here to read the full Cybersecurity Law Book Review.
"Information security generalists who…
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy Templates
– Additional New Compliance Documents
– 60+ New Information Security Policies
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider
In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may…