Couverture de Getting Started with Cybersecurity Risk Management | Ransomware

Getting Started with Cybersecurity Risk Management | Ransomware

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayer Standard gratuitement
Choisissez 1 livre audio par mois dans l'ensemble de notre catalogue.
Écoutez les livres audio que vous avez choisis pendant toute la durée de votre abonnement.
Accédez à volonté à des podcasts incontournables.
Gratuit avec l'offre d'essai, ensuite 2,99 €/mois. Possibilité de résilier l'abonnement chaque mois.

Getting Started with Cybersecurity Risk Management | Ransomware

De : National Institute of Standards and Technology
Lu par : Tom Brooks
Essayer Standard gratuitement

Renouvellement automatique à 2,99 € mois après 30 jours. Annulation possible chaque mois.

Acheter pour 6,24 €

Acheter pour 6,24 €

À propos de ce contenu audio

With the threat of ransomware growing, this “quick-start guide” will help organizations use the National Institute of Standards and Technology (NIST) Ransomware Risk Management: A Cybersecurity Framework Profile to combat ransomware.

Like the broader NIST Cybersecurity Framework, which is widely used voluntary guidance to help organizations better manage and reduce cybersecurity risk, the customized ransomware profile fosters communications and risk-based actions among internal and external stakeholders, including partners and suppliers. The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk.

The activities listed under each function offer a good starting point for any organization, including those with limited resources to address cybersecurity challenges. They help to set priorities so that an organization gets the greatest value out of its efforts to manage ransomware risks. Much depends on how sophisticated your current operations are in terms of cybersecurity risk management. While there are many other things that can and should be done to combat ransomware, it is important to recognize that you don’t need to do everything all at once.

©2022 Tom Brooks (P)2022 Tom Brooks
Sécurité et cryptage
Aucun commentaire pour le moment