Listen free for 30 days

£7.99/month after 30 days. Cancel anytime


Three books in one: 

  • Book One: How to Establish Effective Security Management Functions 
  • Book Two: How to Apply the NIST Risk Management Framework
  • Book Three: How to Manage Risk, Using the NIST Cybersecurity Framework

Download now to get started today! 

You will learn in book one: 

  • Objectives of security management 
  • How to support security goals 
  • Security management principles 
  • Defense in depth 
  • How to apply security controls 
  • Security control functions
  • How to establish organizational governance
  • Security strategy and governance scenarios
  • Information security relationships
  • Business, compliance, and security
  • Management roles and responsibilities 
  • Security roles and responsibilities 
  • How to create a security management program 
  • Security management program structure 
  • How to decipher the risk management program
  • And more

You will learn in book two: 

  • Compliance, security, risk 
  • How to be compliant and secure 
  • Introduction to risk management framework 
  • Introduction to the NIST special publications 
  • Introduction to the RMF publications 
  • Understanding the cybersecurity framework 
  • Comprehending the CSF construction 
  • Comprehending the CSF tiers and profiles
  • Essential RMF concepts
  • Understanding risk tiers
  • Understanding systems and authorization
  • Introduction to roles and responsibilities
  • Comprehending security and privacy in the RMF
  • How to prepare for RMF
  • How to prepare for organization-level tasks
  • And more

You will learn in book three: 

  •  How to reassess risk 
  •  How to implement risk response
  •  Risk response option basics
  •  How to analyze cost and benefit
  •  How to prioritize risk response options
  •  How to respond to risk
  •  Introduction to control types
  •  Control function basics
  •  Understanding security controls
  •  Control standards assessment and analysis
  •  Understanding risk factors and risk metrics
  •  How to develop and use KPIS
  •  How to monitor risk factors
  •  Understanding risk indicators
  •  Reporting compliance basics

Download now to get started today! 

©2020 John Knowles (P)2020 John Knowles

What listeners say about Cybersecurity: 3 Books in 1

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.