Implementing Cybersecurity, The Cybersecurity Body of Knowledge, How to Build a Cyber-Resilient Organization, and Supply Chain Risk Management Set : Security, Audit and Leadership Series - Anne Kohnke

Implementing Cybersecurity, The Cybersecurity Body of Knowledge, How to Build a Cyber-Resilient Organization, and Supply Chain Risk Management Set

By: Anne Kohnke, Ken Sigler, Dan Shoemaker

14 October 2024

At a Glance

RRP $252.00

$178.40

29%OFF

or 4 interest-free payments of $44.60 with

 or 

Available for Backorder. We will order this from our supplier however there isn't a current ETA.

Implementing Cybersecurity provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field.

How to Build a Cyber-Resilient Organization presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system.

Supply Chain Risk Management presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

More in Legal Aspects of IT

Generative AI and Cyberbullying - Ravindra Das

RRP $52.99

$47.25

11%
OFF
Generative AI and Cyberbullying - Ravindra Das

RRP $231.00

$163.50

29%
OFF
I'm a Romance Scam IT Detective (Edition 2) - Selina Co
Beautiful Security : O'Reilly Ser. - Andy Oram

RRP $76.00

$35.75

53%
OFF
Information Technology and Traditional Legal Concepts - Richard Jones
When Face Recognition Goes Wrong - Catriona Havard

RRP $284.00

$224.50

21%
OFF
Architecture in the Age of Human-Computer Interaction - Eric Sauda
Architecture in the Age of Human-Computer Interaction - Eric Sauda
Robotic Safety Systems : An Applied Approach - Justin Starr

RRP $158.00

$131.25

17%
OFF