adbl_ms_membershipImage_includedwith_altText_B076FLV3HT
adbl_ms_membershipImage_includedwith_altText_B076FLV3HT

1 audiobook of your choice.
Stream or download thousands of included titles.
$14.95 a month after 30 day trial. Cancel anytime.
Buy for $24.95

Buy for $24.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Three books in one: 

  • Book One: How to Establish Effective Security Management Functions 
  • Book Two: How to Apply the NIST Risk Management Framework
  • Book Three: How to Manage Risk, Using the NIST Cybersecurity Framework
     

Download now to get started today! 

You will learn in book one: 

  • Objectives of security management 
  • How to support security goals 
  • Security management principles 
  • Defense in depth 
  • How to apply security controls 
  • Security control functions
  • How to establish organizational governance
  • Security strategy and governance scenarios
  • Information security relationships
  • Business, compliance, and security
  • Management roles and responsibilities 
  • Security roles and responsibilities 
  • How to create a security management program 
  • Security management program structure 
  • How to decipher the risk management program
  • And more
     

You will learn in book two: 

  • Compliance, security, risk 
  • How to be compliant and secure 
  • Introduction to risk management framework 
  • Introduction to the NIST special publications 
  • Introduction to the RMF publications 
  • Understanding the cybersecurity framework 
  • Comprehending the CSF construction 
  • Comprehending the CSF tiers and profiles
  • Essential RMF concepts
  • Understanding risk tiers
  • Understanding systems and authorization
  • Introduction to roles and responsibilities
  • Comprehending security and privacy in the RMF
  • How to prepare for RMF
  • How to prepare for organization-level tasks
  • And more
     

You will learn in book three: 

  •  How to reassess risk 
  •  How to implement risk response
  •  Risk response option basics
  •  How to analyze cost and benefit
  •  How to prioritize risk response options
  •  How to respond to risk
  •  Introduction to control types
  •  Control function basics
  •  Understanding security controls
  •  Control standards assessment and analysis
  •  Understanding risk factors and risk metrics
  •  How to develop and use KPIS
  •  How to monitor risk factors
  •  Understanding risk indicators
  •  Reporting compliance basics
     

Download now to get started today! 

©2020 John Knowles (P)2020 John Knowles

What listeners say about Cybersecurity: 3 Books in 1

Average Customer Ratings
Overall
  • 2.5 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 2 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    1
Story
  • 3 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    2 out of 5 stars

do not buy

Filled with fluff, repetitive and uninformative.

The narrator finishes every sentence as if it was a question the inflection is grating even when played at higher speeds.

1 person found this helpful