
- Author:
- Christopher Wright
- Narrator:
- Archie (Male Synthesized Voice)
- Content:
- Unabridged (chapter list)
- Length:
- 1:30 h
- Format:
- MP3 download (60 MB)
- Language:
- English
- Publisher:
- IT Governance Publishing Ltd (2023)
- Genre:
- Computers
- Rating:
- Tags:
- No tags
Track list
01 - Opening credits | 0:14 | 1 MB |
---|---|---|
02 - Accompanying material | 0:24 | 1 MB |
03 - Foreword | 2:28 | 1 MB |
04 - Preface | 4:00 | 2 MB |
05 - About the Author | 2:16 | 1 MB |
06 - Chapter 1 Introduction to cyber security GRC | 0:07 | 1 MB |
07 - Background to GRC | 4:58 | 3 MB |
08 - The three lines of defence model | 2:28 | 1 MB |
09 - What is the relevance of GRC to cyber | 2:40 | 1 MB |
10 - Chapter 2 Cyber security governance | 0:16 | 1 MB |
11 - Introduction and overview | 4:36 | 3 MB |
12 - Culture and awareness | 2:32 | 1 MB |
13 - Threat and risk awareness | 1:06 | 1 MB |
14 - Risk management | 0:57 | 1 MB |
15 - Responding to cyber incidents | 0:44 | 1 MB |
16 - Cyber SOX | 1:04 | 1 MB |
17 - Summary key cyber security questions for directors to ask | 2:04 | 1 MB |
18 - Chapter 3 Cyber security risk management | 0:20 | 1 MB |
19 - Introduction and overview | 1:35 | 1 MB |
20 - Risk management scoping | 1:45 | 1 MB |
21 - Process and control mapping | 1:21 | 1 MB |
22 - Risk assessment | 2:17 | 1 MB |
23 - Designing and implementing controls | 0:39 | 1 MB |
24 - Testing of controls | 0:42 | 1 MB |
25 - Summary | 0:15 | 1 MB |
26 - Chapter 4 Cyber risks and controls | 0:06 | 1 MB |
27 - Introduction and overviewv | 2:52 | 1 MB |
28 - Identifying cyber risks and controls | 3:21 | 2 MB |
29 - Third-party service providers | 3:19 | 2 MB |
30 - Protecting against cyber risks | 14:47 | 9 MB |
31 - Summary | 0:28 | 1 MB |
32 - Chapter 5 Responding to an attack | 0:09 | 1 MB |
33 - Introduction and overview | 0:18 | 1 MB |
34 - Preparing for cyber attacks | 1:24 | 1 MB |
35 - Detecting potential cyber attacks | 2:51 | 1 MB |
36 - Recovery following a cyber attack | 2:06 | 1 MB |
37 - Summary | 0:13 | 1 MB |
38 - Chapter 6 Cyber compliance | 0:16 | 1 MB |
39 - Overview and introduction | 2:17 | 1 MB |
40 - Cyber compliance requirements | 13:21 | 8 MB |
41 - Summary | 0:28 | 1 MB |
42 - Closing Credits | 0:15 | 1 MB |