
- Autor:
- Alan Calder
- Sprecher:
- Stephen Perring
- Inhalt:
- Ungekürzt (Kapitelliste)
- Länge:
- 7:59 h
- Format:
- Mp3 Download (304 MB)
- Sprache:
- Englisch
- Verlag:
- IT Governance Publishing Ltd (2021)
- Genres:
- Computer, Rechtswissenschaft
- Bewertung:
- Tags:
- Keine Tags
Trackliste
01 - Opening Credits | 0:13 | 1 MB |
---|---|---|
02 - Accompanying material | 0:39 | 1 MB |
03 - Structure of the audiobook | 1:41 | 1 MB |
04 - Part 1 Introduction - Chapter 1 The threat landscape | 5:57 | 3 MB |
05 - Chapter 2 Information and cyber security | 2:30 | 1 MB |
06 - Chapter 3 Cyber resilience | 2:33 | 1 MB |
07 - Chapter 4 Regulatory and contractual requirements | 5:32 | 3 MB |
08 - Chapter 5 Implementing cyber security | 9:33 | 6 MB |
09 - Part 2 Threats and vulnerabilities - Chapter 6 The anatomy of threats | 3:49 | 2 MB |
10 - Chapter 7 Technical threats | 16:50 | 10 MB |
11 - Chapter 8 Human threats | 18:55 | 11 MB |
12 - Chapter 9 Physical threats | 9:33 | 5 MB |
13 - Chapter 10 Third-party threats | 9:23 | 5 MB |
14 - Part 3 The CRF processes - Chapter 11 An overview of the CRF processes | 2:46 | 1 MB |
15 - Chapter 12 - Part 1 Manage and protect | 73:53 | 46 MB |
16 - Chapter 12 - Part 2 | 52:55 | 34 MB |
17 - Chapter 12 - Part 3 | 63:14 | 40 MB |
18 - Chapter 13 Identify and detect | 35:33 | 22 MB |
19 - Chapter 14 Respond and recover | 35:57 | 22 MB |
20 - Chapter 15 Govern and assure | 50:47 | 32 MB |
21 - Chapter 16 Maturity levels | 3:29 | 2 MB |
22 - Part 4 Eight steps to implementing cyber security - Chapter 17 Introducing the IT Governance eight-step approach | 1:29 | 1 MB |
23 - Chapter 18 Step 1 Start the project | 10:13 | 6 MB |
24 - Chapter 19 Step 2 Determine requirements and objectives | 3:07 | 2 MB |
25 - Chapter 20 Step 3 Determine the scope | 2:22 | 1 MB |
26 - Chapter 21 Step 4 Define current and ideal target states | 3:43 | 2 MB |
27 - Chapter 22 Step 5 - Establish a continual improvement model | 1:35 | 1 MB |
28 - Chapter 23 Step 6 Conduct a risk assessment | 1:35 | 1 MB |
29 - Chapter 24 Step 7 Select and implement controls | 1:21 | 1 MB |
30 - Chapter 25 Step 8 Measure and review performance | 6:03 | 3 MB |
31 - Part 5 Reference frameworks - Chapter 26 Why you should consider reference frameworks | 5:16 | 3 MB |
32 - Chapter 27 Core | 4:00 | 2 MB |
33 - Chapter 28 Baseline | 8:06 | 5 MB |
34 - Chapter 29 Extended | 10:24 | 6 MB |
35 - Chapter 30 Embedded | 4:47 | 2 MB |
36 - Part 6 Conclusion and appendices - Chapter 31 Conclusion | 1:30 | 1 MB |
37 - Appendix 1 IT and information asset checklist | 1:57 | 1 MB |
38 - Appendix 2 Template outline project plan | 0:11 | 1 MB |
39 - Appendix 3 Glossary of acronyms and abbreviations | 5:08 | 2 MB |
40 - Further reading | 1:14 | 1 MB |
41 - Closing Credits | 0:16 | 1 MB |