У нас вы можете посмотреть бесплатно Information Security Terminology - Lecture 16/16 - Security Policies and Standards или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
0:00 Lecture 16: Security Policies and Compliance 0:14 Introduction 1:45 Part 1: Security Policy Hierarchy / The Purpose of Security Policies 2:45 Policy Document Hierarchy 4:32 Essential Security Policies 6:03 Policy Development and Maintenance 7:05 Part 2: ISO and IEC 27001 Information Security Management System / What is an ISMS? 8:11 ISO 27001 Structure 9:29 Annex A Controls 10:28 ISO 27001:2022 Updates 11:30 Implementation Approach 12:43 Part 3: NIST Cybersecurity Framework 2.0 / CSF Evolution 13:25 The Six Functions 14:42 Implementation Tiers 15:45 Profiles 16:22 CSF 2.0 Key Changes 17:03 Using CSF with Other Frameworks 17:45 Part 4: CIS Controls / CIS Controls Overview 18:13 Implementation Groups 19:09 The 18 Controls 21:14 CIS Benchmarks 21:52 Part 5: Security Governance and Audit / Security Governance 23:08 The Three Lines Model 23:58 Security Audit 24:55 SOC Reports 25:43 Audit Preparation 26:29 Part 6: Incident Response Planning / Why Planning Matters 27:18 Incident Response Phases 28:13 Incident Response Plan Contents 29:08 Incident Response Team 29:58 Testing and Exercises 30:40 Part 7: EU Regulations - NIS2, DORA, AI Act, Cyber Resilience Act / The EU Regulatory Landscape 31:11 NIS2 Directive 32:48 Digital Operational Resilience Act (DORA) 34:13 AI Act 35:35 Cyber Resilience Act 37:02 Part 8: GDPR, PCI DSS, and HIPAA / General Data Protection Regulation (GDPR) 38:27 Payment Card Industry Data Security Standard (PCI DSS) 39:54 Health Insurance Portability and Accountability Act (HIPAA) 40:54 Part 9: Building a Compliance Program / Compliance Program Components 41:55 Managing Multiple Frameworks 42:47 Compliance vs. Security 43:37 Part 10: Current Trends and Future Directions / Regulatory Convergence and Divergence 44:22 Automation and Continuous Compliance 45:07 Board-Level Cybersecurity 45:48 Preparing for the Future 46:18 Conclusion 49:04 Discussion Questions 49:32 Review Questions 50:26 Key Terms 52:57 References and Further Reading