Kirjahaku
Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.
15 kirjaa tekijältä Mark a Russo Cissp-Issap
The California Consumer Privacy Act (CCPA) & NIST 800-171
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
Understanding What the CCPA is and How to Effectively Apply the NIST 800-171 Security Framework.The California Consumer Privacy Act (CCPA) and NIST 800-171 designed to provide clear direction and understanding of how to implement the CCPA either in a business, agency or organization. The CCPA provides provisions specific to California residents and the companies regarding the 2018 compulsory law to protect personal information statewide. While NIST 800-series Cybersecurity publications tell a business "what" is required, they do not necessarily help in telling "how" to meet the 110 security control requirements in NIST 800-171. This book is also written to explain what the National Institute of Standards and Technology (NIST) 800-171 security controls require and how to meet them effectively for the purposes of CCPA compliance. And, will walk you and your IT staff through the security controls in enough detail to ensure a complete and "good faith" security effort has occurred.
Writing an Effective Plan of Action & Milestones (POAM)
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
WHAT IS A PLAN OF ACTION AND MILESTONES (POAM)?A POAM is exactly what it is as described. It is a plan, specific to the selected security controls that cannot be adequately addressed, or a vulnerability identified by security tools that assess the cybersecurity posture of an Information System (IS), and the associated plan to fix it. It is typically applicable to the local physical and virtual network infrastructure that provides the
System Security Plan (SSP) Template & Workbook - NIST-based
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
This is a supplement to "DOD NIST 800-171 Compliance Guidebook"." It is designed to provide more specific, direction and guidance on completing the core NIST 800-171 artifact, the System Security Plan (SSP). This is part of a ongoing series of support documents being developed to address the recent changes and requirements levied by the Federal Government on contractors wishing to do business with the government. The intent of these supplements is to provide immediate and valuable information so business owners and their Information Technology (IT) staff need. The changes are coming rapidly for cybersecurity contract requirements. Are you ready? We plan to be ahead of the curve with you with high-quality books that can provide immediate support to the ever-growing challenges of cyber-threats to the Government and your business.
A WELL-WRITTEN POAM IS KEY TO SUCCESS IN ANSWERING NIST 800-171 REQUIREMENTSThis is an ongoing series of supplements we are issuing regarding the changes in federal cybersecurity contracting requirements. It is designed to align with our groundbreaking cybersecurity book: Understanding Your Responsibilities in Meeting DOD NIST 800-171. Our desire is to provide complete how-to guidance and instruction to effectively and quickly address your businesses' need to secure your Information Technology (IT) environments to effectively compete in the federal contract space. This is designed to be a template, but much like "Understanding," is designed to capture critical elements of cybersecurity best practices and information that you can implement immediately. A POAM provides a disciplined and structured method to reduce, manage, mitigate, and ultimately, address an active POAM finding/vulnerability. POAM's provide findings, recommendations, and actions that will correct the deficiency or vulnerability; it is not just identifying the risk or threat but having a "plan" that reduces the danger to subjective determination, by the System Owner (business) that the control is met. A POAM is a Living-Document; you cannot just do it once and put it "on a shelf." Active Management of Security Controls is intended to protect your vital and sensitive data from loss, compromise or destruction. "Making the cryptic more comfortable(TM)."
WHAT WOULD HAPPEN IF NIST 800-171 WAS REQUIRED FOR ALL COMPANIES DOING BUSINESS WITH THE FEDERAL GOVERNMENT?This book is written to help the small to large business owner transition easily and effectively to NIST 800-171. This book is dedicated to the anticipated US Federal-wide government requirement for all businesses, prime and subcontractors, to meet the more expansive implementation of NIST 800-171. This is a how-to book designed to help the novice through professional maneuver this cybersecurity requirement.
NIST 800-171 for Federal Contract Professionals
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
THE DEFINITIVE GUIDE FOR FEDERAL CONTRACT PROFESSIONALS.This is the first of its kind how-to book for Federal Contract Professionals. It provides a detailed explanation of the 110 NIST 800-171 controls and how to best determine their completeness. The book explains and anticipates the pending expansion of NIST 800-171 and FAR Clause 52.204-21 to the entirety of the federal government. Be prepared. For Contract Officers, Contract Specialists, and Consultants to help contracting work through the challenges of NIST 800-171.
The Security Auditor's Guidebook for NIST 800-171
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
THE COMPLETE NIST 800-171 SECURITY AUDITOR'S GUIDEThis book supports the federal government and its contracted support personnel in efficiently and effectively validating and verifying that businesses meet the new federal cybersecurity contract requirements. While NIST 800-series describe "what" to do, this series is designed to help security professionals on "how" to properly inspect the 110 NIST 800-171 security controls.It is written based upon NIST and federal government best-practices to ensure companies, their prime and subcontractors, have properly secured their Information Technology (IT) environments connected to federal agencies' vast arrays of IT networks. Furthermore, NIST 800-171 is more specifically about protecting Controlled Unclassified Information (CUI) from loss, damage or compromise. The expanded requirement is designed to create a more secure US and international IT environment responsive and proactive to both internal and external cyber-threats.
YOU ARE AN 'IT 'OR CYBER-SOLDIER. YOU NEED JUST THE BASICS. THIS BOOK WILL PROVIDE THAT QUICK-START FOR NIST 800-171.Based on the foundational book, "NIST 800-171; Beyond DOD," it provides you just the basics. No long explanations. Just the how-to, and how to fix it fast for your company or business. This is one lean, mean, fighting "combat guide."
THE DEFINITIVE CYBERSECURITY GUIDEBOOK FOR NIST 800-171 COMPLIANCEThe real challenge with working with National Institute of Standards and Technology (NIST) direction is it tells you "what" to do, but not "how" to do it. With over 20 years in secure hardware and software development, this book was written to help the business owner and his IT staff compete and maintain their contracts with the Department of Defense (DOD). This is a book written to walk you through the controls and provide you a clear, plain-English, description of how to answer the 110 security controls. We hope this makes this new shift to stronger cybersecurity for you and the DOD easier and understandable.
THE IMPORTANCE OF A CLOUD SERVICE LEVEL AGREEMENT (CSLA)This book is not another Cloud Security Theory book, it is a practical and how-to volume for both the Cloud Service Customer (CSC) and Cloud Service Provider (CSP) negotiate the Cloud Service Level Agreement (CSLA) based on defined terms and metrics. This is more than a high-level description of "risks and challenges" involved in entering into a true CSLA. It is a "down in the weeds" approach with nearly 100 specific Service Level Objectives (SLO)-the next level down--with suggested metrics that get you started on Day 1.This book is written to address a vital component of Cloud Security, the Service Level Agreement (SLA). While many of us who work in the cybersecurity agree that the SLA is a critical artifact in determining third-party responsibility for the implementation of security controls, there is very little information in the public arena on what a good SLA consists of. This book is written for that very purpose. If you are writing or reviewing a CSLA or an Information Technology (IT) SLA in general, what are the elements needed to effectively have a good service agreement? What are the kinds of Service Level Objectives (SLO) do you need to manage as a company or agency to ensure your overall shared cybersecurity responsibilities are being met? This book is written to provide a how-to approach to better understand the place and importance of the CSLA.
CLOUD SOLUTIONS BEGIN WITH A WELL-DESIGNED CLOUD SERVICE LEVEL AGREEMENT (CSLA)This book is not another Cloud Security Theory book, it is a practical and how-to volume for both the Cloud Service Customer (CSC) and Cloud Service Provider (CSP) negotiate the CSLA based on defined terms and metrics. This is more than a high-level description of "risks and challenges" involved in entering into a true CSLA. It is a "down in the weeds" approach with nearly 100 specific Service Level Objectives (SLO)-the next level down--with suggested metrics that get you started on Day 1.So you have decided to deploy part or all of your business into a major cloud vendor. The questions are: 1) Will I get the functionality my business requires, and 2) more importantly, how do I know how secure it really is? This book is written to help you and your IT staff develop, review, and oversee an effective cloud implementation. We provide you with a large and detailed amount of Service Level Objectives (SLO) that ensure a smooth transition, and ultimately the framework to maintain a proper quality assurance and oversight mission. This book is based upon both US and international lessons learned and best practices designed to provide the value and return on investment that businesses rightfully demand.
NIST 800-171 for Federal Contract Professionals 2nd Edition
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
THE DEFINITIVE UPDATE FOR FEDERAL CONTRACT PROFESSIONALS. This is the second of its kind how-to book for Federal Contract Professionals. It includes the additions from the recent release of NIST 800-171A, "Assessing Security Requirements for Controlled Unclassified Information." It provides a more detailed explanation of the 110 NIST 800-171 controls and how to best determine their completeness. The book explains and anticipates the pending expansion of NIST 800-171 and FAR Clause 52.204-21 to the entirety of the federal government. Be prepared. For Contract Officers, Contract Specialists, and Consultants to help Contracting Professionals work through the challenges of NIST 800-171.
The Security Auditor's Guidebook for NIST 800-171 2nd Edition
Mark a Russo Cissp-Issap
Independently Published
2018
pokkari
THE COMPLETE NIST 800-171 SECURITY AUDITOR'S GUIDE 2ND EDITION. This book is an update that includes changes from NIST 800-171A, "Assessing Security Requirements for Controlled Unclassified Information." It is written in anticipation of expansion of NIST 800-171 federal-wide. It is specifically designed to guide federal and contracted support personnel in efficiently and effectively validating and verifying that businesses meet emerging federal cybersecurity contract requirements. While NIST 800-series describe "what" to do, this series is designed to help security professionals on "how" to properly inspect the 110 NIST 800-171 security controls. Also, it is written based upon NIST and federal government best-practices to ensure companies, their prime and subcontractors, have properly secured their Information Technology (IT) environments connected to federal agencies' vast arrays of IT networks; NIST 800-171 is more specifically about protecting Controlled Unclassified Information (CUI) from loss, damage or compromise. The expanded requirement is designed to create a more secure US and international IT environment responsive and proactive to both internal and external cyber-threats.
YOU ARE AN 'IT 'OR CYBER-SOLDIER. YOU NEED JUST THE BASICS IN THIS 2ND EDITION. THIS BOOK WILL PROVIDE THAT QUICK-START FOR NIST 800-171.Based on the foundational book, "NIST 800-171; Beyond DOD," and it includes the June 2018 NIST 800-171A additions. It provides the basics with no lengthy explanations. Just the how-to, and how to fix it fast for a company, business, or agency mandated to use 800-171. This is one lean, mean, fighting "battle book."