Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

10 kirjaa tekijältä Mark a Russo Cissp-Issap Ciso

Federal Acquisition Regulation (FAR) 52.204-21

Federal Acquisition Regulation (FAR) 52.204-21

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
Federal Acquisition Regulation (FAR) 52.204-21: NIST 800-171 Revolutionary Challenges Facing Federal Contracting The pending challenges and implications across the federal contract space is expected to occur in late 2018. This book is designed to support contract officers, specialists, and their support staffs. Are you ready for the Revolution?
Is Agile Cybersecurity Possible?

Is Agile Cybersecurity Possible?

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
"AGILE CYBERSECURITY" CAN BE DEFINED BY THE TERM "CONSTRAINED CONTROLS"This book is a spin-off of our series on anticipated expansion and use of National Institute of Standards and Technology (NIST) based frameworks, and how they fit the terms of agile or lean development. In this book, we explore several approaches to making "agility" a reality. We discuss both the National Cybersecurity Framework and NIST Special Publication 800-171 as the kernels of the demands for greater cybersecurity in an ever-threat-filled Internet environment. We also introduce the Risk Assessment (RA) as a less-than used and understood "bridge" to agile development.
Cybersecurity Professional's Guide for the California Consumer Privacy Act (CCPA)
WELCOME TO THE CHALLENGE OF THE CALIFORNIA CONSUMER PRIVACY ACT CCPA)This book is designed to guide the Cybersecurity Professional and Specialist to assist business owners in California to meet the new 2018 requirements of the CCPA. It is written to provide clear direction and understanding of how to implement the National Institute of Standards and Technology's (NIST) 800-171 cybersecurity framework. The information is provided specific to the CCPA either for a business, agency or organization that is required to meet this new State Law and describes both technical and administrative measures that will attain an acceptable level of compliance for State certifying officials. The CCPA provides several specific provisions for California residents and the companies that operate within its borders. These are intended to address the ongoing demands of security and privacy in the 21st Century.The author has over 25 years of secure software development and is an internationally recognized expert in the area of cybersecurity. For the last 10 years he has been the Chief Information Security Officer at the Dept of Ed and has worked the white-knuckle challenges of security issues facing the Navy's Tomahawk Missile system and the F-35 Strikefighter programs.
NIST 800-171 MEP Companion Handbook

NIST 800-171 MEP Companion Handbook

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
LACK OF CONTRACTOR SECURITY HAS GOTTEN US TO THIS POINT...In May 2017, a major federal contractor left unencrypted Department of Defense files on a public Amazon server; this resulted in over 60,000 sensitive files being exposed to the US's friends and enemies alike. NIST 800-171 is the government's first and most serious move to protect sensitive data and enforce its protection on all its supporting contractors across the nation and further across the global supply chain. This book is written to supplement NIST 800-171 Manufacturing Extension Partnership (MEP) and better define what it really means for corporate America.The author has extensive federal government experience working in cybersecurity over the past decade. His books on cybersecurity have been the current foundation of a "deeper dive" into the 110 security controls of NIST 800-171. If you need help maneuvering the coming "storm" of NIST 800-171, the "MEP Companion Handbook" is a must read...and a must used to protect sensitive national and corporate data.
Information Technology Security Audit Guidebook

Information Technology Security Audit Guidebook

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
NIST 800-171 SECURITY AUDITING:: Special 2019 edition update includes section on Controlled Unclassified Information (CUI) marking, handling, and storage...over 30 pages of detailed instructions (Sep 2019)... Mark... ***FEB 2020 UPDATE INCLUDES FREE ACCESS TO A CYBERSECURITY POLICY, and HOW TO CREATE ALL OTHER SUPPORT ACCREDITATION DOCS. AN OVER $500 VALUE***This book is designed to walk the auditor through each of the 110 controls with a thorough understanding of whether a control is met or not. There is no "partial credit." While the process is subjective, the assessor must make a reasonable determination that the system owner understands and can demonstrate his company or agency's compliance with NIST 800-171. We include a compliance checklist designed to build out a record of the audit. This has been one of our most sought books on the evolving state of NIST 800-171.
The National Cybersecurity (NCF) Framework 1.1

The National Cybersecurity (NCF) Framework 1.1

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
**A 2020 Update with all the latest information**THE NATIONAL CYBERSECURITY FRAMEWORK 1.1 is the latest approach supported by the Department of Homeland Security (DHS) to provide a simplified approach to protecting corporate and business owners sensitive systems and data. This book is written to provide the first-ever road-map for a business to understand and execute the 108 defined security controls. NCF is the next generation of cybersecurity protections to defend the nation's critical infrastructure from insider threats and nation-state actors. This east to follow book was designed to provide you the substantive answers you need to protect your IT systems from threats 24-7.
Nist 800-137

Nist 800-137

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
THE "HOLY GRAIL" OF CYBERSECURITY IS "CONTINUOUS MONITORING"This book is written as a beginner's guide to the challenges and solutions of CCM as proscribed by the National Institute of Standards and Technology (NIST). CCM is to be that final step in the Risk Management Framework (RMF) process. Once you have completed all the five preceding steps, you will enter Step, Continuous Monitoring. Some of this can be done manually, but the objective is to automate the process to alert System Owner's of critical changes in the architecture that afford vulnerabilities and avenues of approach for threats; threats that may include Insider Threats and nation-state actors such as Russia, China, and Iran. CCM is on the horizon, yet we are years from attaining true CCM as described in this book.
DOD NIST 800-171 & 171A Compliance Guidebook 2nd Edition

DOD NIST 800-171 & 171A Compliance Guidebook 2nd Edition

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
SOME MAJOR CHANGES TO NIST 800-171 ALL IN THIS BOOKIn June 2018, the NIST issued NIST 800-171A, "Assessing Security Requirements for Controlled Unclassified Information." It increased the challenges and some-what the complexities of current federal, and especially for the Department of Defense (DOD) efforts, to better secure the national cybersecurity environment. It added another 298 sub-controls (SUB CTRL) that may also be described as a Control Correlation Identifier (CCI). They provide a standard identifier and description for each of a singular and actionable statement that comprises a general cybersecurity control. These sub-controls provide added detail and granularity that bridge the gap between high-level policy expressions and low-level implementations. The ability to trace security requirements from their original "high-level" control to its low-level implementation allows organizations to demonstrate compliance. The impacts of this update are currently unknown and will likely be implemented at the direction of the federal agency and contract office whether these additional sub-controls are answered in part or in total as part of a company's self-assessment responses to this change to NIST 800-171.No matter how any federal agency interprets and executes NIST 800-171 with with 171AA contractually, the information in THIS book is a significant supplement to the NIST 800-171 evolution. The information provides the reader with the latest information to answer the control requirements with needed specificity to meet the goal of a compliant and secure NIST 800-171 Information Technology (IT) environment.
Nist 800-171

Nist 800-171

Mark a Russo Cissp-Issap Ciso

Independently Published
2018
pokkari
This book is a Second Edition of our highly acclaimed edition. It is written to help the small to large business owner transition easily and effectively to NIST 800-171. This edition includes the added sub-controls for NIST 800-171A for greater clarity, and leverages the original work to provide a comprehensive approach. It is dedicated to the anticipated US Federal-wide government requirement for all businesses, prime and subcontractors, to meet the more expansive implementation of NIST 800-171. This is a how-to book designed to help the novice through professional maneuver this cybersecurity requirement.