Getting Started with Cybersecurity Risk Management | Ransomware Audiolibro Por National Institute of Standards and Technology arte de portada

Getting Started with Cybersecurity Risk Management | Ransomware

Vista previa

Prueba gratis de 30 días de Audible Standard

Prueba Standard gratis
Selecciona 1 audiolibro al mes de nuestra colección completa de más de 1 millón de títulos.
Es tuyo mientras seas miembro.
Obtén acceso ilimitado a los podcasts con mayor demanda.
Plan Standard se renueva automáticamente por $8.99 al mes después de 30 días. Cancela en cualquier momento.

Getting Started with Cybersecurity Risk Management | Ransomware

De: National Institute of Standards and Technology
Narrado por: Tom Brooks
Prueba Standard gratis

$8.99 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $11.18

Compra ahora por $11.18

With the threat of ransomware growing, this “quick-start guide” will help organizations use the National Institute of Standards and Technology (NIST) Ransomware Risk Management: A Cybersecurity Framework Profile to combat ransomware.

Like the broader NIST Cybersecurity Framework, which is widely used voluntary guidance to help organizations better manage and reduce cybersecurity risk, the customized ransomware profile fosters communications and risk-based actions among internal and external stakeholders, including partners and suppliers. The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk.

The activities listed under each function offer a good starting point for any organization, including those with limited resources to address cybersecurity challenges. They help to set priorities so that an organization gets the greatest value out of its efforts to manage ransomware risks. Much depends on how sophisticated your current operations are in terms of cybersecurity risk management. While there are many other things that can and should be done to combat ransomware, it is important to recognize that you don’t need to do everything all at once.

©2022 Tom Brooks (P)2022 Tom Brooks
Administración de riesgos Seguridad y Cifrado Seguridad para computadora Ciberseguridad Hackeo Tecnología
Todavía no hay opiniones