Скачать книгу
Contractual, legal, industry standards, and regulatory requirements
|
4
|
1.4.2
|
Privacy requirements
|
4
|
1.5
|
Understand legal and regulatory issues that pertain to information security in a holistic context
|
4
|
1.5.1
|
Cybercrimes and data breaches
|
4
|
1.5.2
|
Licensing and intellectual property (IP) requirements
|
4
|
1.5.3
|
Import/export controls
|
4
|
1.5.4
|
Transborder data flow
|
4
|
1.5.5
|
Privacy
|
4
|
1.6
|
Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
|
19
|
1.7
|
Develop, document, and implement security policy, standards, procedures, and guidelines
|
1
|
1.8
|
Identify, analyze, and prioritize Business Continuity (BC) requirements
|
3
|
1.8.1
|
Business Impact Analysis (BIA)
|
3
|
1.8.2
|
Develop and document the scope and the plan
|
3
|
1.9
|
Contribute to and enforce personnel security policies and procedures
|
2
|
1.9.1
|
Candidate screening and hiring
|
2
|
1.9.2
|
Employment agreements and policies
|
2
|
1.9.3
|
Onboarding, transfers, and termination processes
|
2
|
1.9.4
|
Vendor, consultant, and contractor agreements and controls
|
2
|
1.9.5
|
Compliance policy requirements
|
2
|
1.9.6
|
Privacy policy requirements
|
2
|
1.10
|
Understand and apply risk management concepts
|
2
|
1.10.1
|
Identify threats and vulnerabilities
|
2
|
1.10.2
|
Risk assessment/analysis
|
2
|
1.10.3
|
Risk response
|
2
|
1.10.4
|
Countermeasure selection and implementation
|
2
|
1.10.5
|
Applicable types of controls (e.g., preventive, detective, corrective)
|
2
|
1.10.6
|
Control assessments (security and privacy)
|
2
|
1.10.7
|
Monitoring and measurement
|
2
|
1.10.8
|
Reporting
|
2
|
1.10.9
|
Continuous improvement (e.g., Risk maturity modeling)
|
2
|
1.10.10
|
Risk frameworks
|
2
|
1.11
|
Скачать книгу
|