Get Your Free Audiobook

Non-member price: $34.76

After 30 days, Audible is $16.45/mo. Cancel anytime.

Publisher's Summary

Three books in one: 

  • Book One: How to Establish Effective Security Management Functions 
  • Book Two: How to Apply the NIST Risk Management Framework
  • Book Three: How to Manage Risk, Using the NIST Cybersecurity Framework

Download now to get started today! 

You will learn in book one: 

  • Objectives of security management 
  • How to support security goals 
  • Security management principles 
  • Defense in depth 
  • How to apply security controls 
  • Security control functions
  • How to establish organizational governance
  • Security strategy and governance scenarios
  • Information security relationships
  • Business, compliance, and security
  • Management roles and responsibilities 
  • Security roles and responsibilities 
  • How to create a security management program 
  • Security management program structure 
  • How to decipher the risk management program
  • And more

You will learn in book two: 

  • Compliance, security, risk 
  • How to be compliant and secure 
  • Introduction to risk management framework 
  • Introduction to the NIST special publications 
  • Introduction to the RMF publications 
  • Understanding the cybersecurity framework 
  • Comprehending the CSF construction 
  • Comprehending the CSF tiers and profiles
  • Essential RMF concepts
  • Understanding risk tiers
  • Understanding systems and authorization
  • Introduction to roles and responsibilities
  • Comprehending security and privacy in the RMF
  • How to prepare for RMF
  • How to prepare for organization-level tasks
  • And more

You will learn in book three: 

  •  How to reassess risk 
  •  How to implement risk response
  •  Risk response option basics
  •  How to analyze cost and benefit
  •  How to prioritize risk response options
  •  How to respond to risk
  •  Introduction to control types
  •  Control function basics
  •  Understanding security controls
  •  Control standards assessment and analysis
  •  Understanding risk factors and risk metrics
  •  How to develop and use KPIS
  •  How to monitor risk factors
  •  Understanding risk indicators
  •  Reporting compliance basics

Download now to get started today! 

©2020 John Knowles (P)2020 John Knowles

What listeners say about Cybersecurity: 3 Books in 1

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible Australia acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.