Regulations such as Sarbanes-Oxley, NERC CIP, the Gramm-Leach-Bliley Act, and HIPAA are complex and require a nuanced understanding. This book answers one of the most difficult IT and compliance officer's conundrum: how to streamline and automate the processes associated with ensuring that cybersecurity controls comply with all relevant regulations, company policies, and management expectations. The author addresses each cybersecurity control and examines ways that organizations can better automate the practice of detecting the existence-or failure-of each control-making cybersecurity compliance and risk management an enterprise-wide solution.…mehr
Regulations such as Sarbanes-Oxley, NERC CIP, the Gramm-Leach-Bliley Act, and HIPAA are complex and require a nuanced understanding. This book answers one of the most difficult IT and compliance officer's conundrum: how to streamline and automate the processes associated with ensuring that cybersecurity controls comply with all relevant regulations, company policies, and management expectations. The author addresses each cybersecurity control and examines ways that organizations can better automate the practice of detecting the existence-or failure-of each control-making cybersecurity compliance and risk management an enterprise-wide solution.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
What Does It Mean to Be Cybersecurity Compliant and Why Does It Matter? Cybersecurity Laws, Regulations, Standards, and Other Guidance. What Does a Compliance Automation Solution Look Like. An Introduction to the NIST 800-53 Control Families. Access Control Family of Cybersecurity Controls. Awareness and Training Family of Cybersecurity Controls. Audit Family of Cybersecurity Controls. Security Assessment and Authorization Family of Cybersecurity Controls. Configuration Management Family of Cybersecurity Controls. Contingency Planning Family of Cybersecurity Controls. Identification and Authentication Family of Cybersecurity Controls. Incident Response Family of Cybersecurity Controls. Maintenance Family of Cybersecurity Controls. Media Protection Family of Cybersecurity Controls. Physical and Environmental Protection Family of Cybersecurity Controls. Planning Family of Cybersecurity Controls. Personnel Security Family of Cybersecurity Controls. Risk Assessment Family of Cybersecurity Controls. System and Services Acquisition Family of Cybersecurity Controls. System and Communications Protection Family of Cybersecurity Controls. System and Information Integrity Family of Cybersecurity Controls. Program Management Family of Cybersecurity Controls. Other Cybersecurity Controls Not Covered by NIST Framework. The Future of Automation for Cybersecurity Controls and their Verification. Appendix A: Mapping of Relevant Cybersecurity Control Frameworks.
What Does It Mean to Be Cybersecurity Compliant and Why Does It Matter? Cybersecurity Laws, Regulations, Standards, and Other Guidance. What Does a Compliance Automation Solution Look Like. An Introduction to the NIST 800-53 Control Families. Access Control Family of Cybersecurity Controls. Awareness and Training Family of Cybersecurity Controls. Audit Family of Cybersecurity Controls. Security Assessment and Authorization Family of Cybersecurity Controls. Configuration Management Family of Cybersecurity Controls. Contingency Planning Family of Cybersecurity Controls. Identification and Authentication Family of Cybersecurity Controls. Incident Response Family of Cybersecurity Controls. Maintenance Family of Cybersecurity Controls. Media Protection Family of Cybersecurity Controls. Physical and Environmental Protection Family of Cybersecurity Controls. Planning Family of Cybersecurity Controls. Personnel Security Family of Cybersecurity Controls. Risk Assessment Family of Cybersecurity Controls. System and Services Acquisition Family of Cybersecurity Controls. System and Communications Protection Family of Cybersecurity Controls. System and Information Integrity Family of Cybersecurity Controls. Program Management Family of Cybersecurity Controls. Other Cybersecurity Controls Not Covered by NIST Framework. The Future of Automation for Cybersecurity Controls and their Verification. Appendix A: Mapping of Relevant Cybersecurity Control Frameworks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826