About
Support
Open in Web App
Open in Desktop App
1
Opening Credits & Accompanying Material & Foreword.1 - How Cyber Security Can Protect Your Business
Christopher Wright
2
Foreword.2 & Preface.1 - How Cyber Security Can Protect Your Business
3
Preface.2 & About the Author.1 - How Cyber Security Can Protect Your Business
4
About the Author.2 & Chapter 1: Introduction to Cyber Security Grc.1 - How Cyber Security Can Protect Your Business
5
Chapter 1: Introduction to Cyber Security Grc.2 & Background to Grc.1 - How Cyber Security Can Protect Your Business
6
Background to Grc.2 - How Cyber Security Can Protect Your Business
7
Background to Grc.3 & the Three Lines of Defence Model.1 - How Cyber Security Can Protect Your Business
8
The Three Lines of Defence Model.2 & What Is the Relevance of Grc to Cyber?.1 - How Cyber Security Can Protect Your Business
9
What Is the Relevance of Grc to Cyber?.2 & Chapter 2: Cyber Security Governance & Introduction and Overview.1 - How Cyber Security Can Protect Your Business
10
Introduction and Overview.2 - How Cyber Security Can Protect Your Business
11
Introduction and Overview.3 & Culture and Awareness.1 - How Cyber Security Can Protect Your Business
12
Culture and Awareness.2 & Threat and Risk Awareness.1 - How Cyber Security Can Protect Your Business
13
Threat and Risk Awareness.2 & Risk Management & Responding to Cyber Incidents.1 - How Cyber Security Can Protect Your Business
14
Responding to Cyber Incidents.2 & Cyber Sox & Summary: Key Cyber Security Questions for Directors to Ask.1 - How Cyber Security Can Protect Your Business
15
Summary: Key Cyber Security Questions for Directors to Ask.2 & Chapter 3: Cyber Security Risk Management & Introduction and Overview.1 - How Cyber Security Can Protect Your Business
16
Introduction and Overview.2 & Risk Management Scoping.1 - How Cyber Security Can Protect Your Business
17
Risk Management Scoping.2 & Process and Control Mapping & Risk Assessment.1 - How Cyber Security Can Protect Your Business
18
Risk Assessment.2 & Designing and Implementing Controls.1 - How Cyber Security Can Protect Your Business
19
Designing and Implementing Controls.2 & Testing of Controls & Summary & Chapter 4: Cyber Risks and Controls & Introduction and Overviewv.1 - How Cyber Security Can Protect Your Business
20
Introduction and Overviewv.2 & Identifying Cyber Risks and Controls.1 - How Cyber Security Can Protect Your Business
21
Identifying Cyber Risks and Controls.2 - How Cyber Security Can Protect Your Business
22
Identifying Cyber Risks and Controls.3 & Third-Party Service Providers.1 - How Cyber Security Can Protect Your Business
23
Third-Party Service Providers.2 & Protecting Against Cyber Risks.1 - How Cyber Security Can Protect Your Business
24
Protecting Against Cyber Risks.2 - How Cyber Security Can Protect Your Business
25
Protecting Against Cyber Risks.3 - How Cyber Security Can Protect Your Business
26
Protecting Against Cyber Risks.4 - How Cyber Security Can Protect Your Business
27
Protecting Against Cyber Risks.5 - How Cyber Security Can Protect Your Business
28
Protecting Against Cyber Risks.6 - How Cyber Security Can Protect Your Business
29
Protecting Against Cyber Risks.7 - How Cyber Security Can Protect Your Business
30
Protecting Against Cyber Risks.8 & Summary & Chapter 5: Responding to an Attack & Introduction and Overview & Preparing for Cyber Attacks.1 - How Cyber Security Can Protect Your Business
31
Preparing for Cyber Attacks.2 & Detecting Potential Cyber Attacks.1 - How Cyber Security Can Protect Your Business
32
Detecting Potential Cyber Attacks.2 & Recovery Following a Cyber Attack.1 - How Cyber Security Can Protect Your Business
33
Recovery Following a Cyber Attack.2 & Summary.1 - How Cyber Security Can Protect Your Business
34
Summary.2 & Chapter 6: Cyber Compliance & Overview and Introduction.1 - How Cyber Security Can Protect Your Business
35
Overview and Introduction.2 & Cyber Compliance Requirements.1 - How Cyber Security Can Protect Your Business
36
Cyber Compliance Requirements.2 - How Cyber Security Can Protect Your Business
37
Cyber Compliance Requirements.3 - How Cyber Security Can Protect Your Business
38
Cyber Compliance Requirements.4 - How Cyber Security Can Protect Your Business
39
Cyber Compliance Requirements.5 - How Cyber Security Can Protect Your Business
40
Cyber Compliance Requirements.6 & Summary & Closing Credits - How Cyber Security Can Protect Your Business