Getting Started with Cybersecurity Risk Management | Ransomware
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。
-
ナレーター:
-
Tom Brooks
このコンテンツについて
With the threat of ransomware growing, this “quick-start guide” will help organizations use the National Institute of Standards and Technology (NIST) Ransomware Risk Management: A Cybersecurity Framework Profile to combat ransomware.
Like the broader NIST Cybersecurity Framework, which is widely used voluntary guidance to help organizations better manage and reduce cybersecurity risk, the customized ransomware profile fosters communications and risk-based actions among internal and external stakeholders, including partners and suppliers. The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk.
The activities listed under each function offer a good starting point for any organization, including those with limited resources to address cybersecurity challenges. They help to set priorities so that an organization gets the greatest value out of its efforts to manage ransomware risks. Much depends on how sophisticated your current operations are in terms of cybersecurity risk management. While there are many other things that can and should be done to combat ransomware, it is important to recognize that you don’t need to do everything all at once.
©2022 Tom Brooks (P)2022 Tom Brooks