Getting Started with Cybersecurity Risk Management | Ransomware Audiobook By National Institute of Standards and Technology cover art

Getting Started with Cybersecurity Risk Management | Ransomware

Preview

Try for $0.00
Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Getting Started with Cybersecurity Risk Management | Ransomware

By: National Institute of Standards and Technology
Narrated by: Tom Brooks
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $6.95

Buy for $6.95

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Cancel

About this listen

With the threat of ransomware growing, this “quick-start guide” will help organizations use the National Institute of Standards and Technology (NIST) Ransomware Risk Management: A Cybersecurity Framework Profile to combat ransomware.

Like the broader NIST Cybersecurity Framework, which is widely used voluntary guidance to help organizations better manage and reduce cybersecurity risk, the customized ransomware profile fosters communications and risk-based actions among internal and external stakeholders, including partners and suppliers. The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk.

The activities listed under each function offer a good starting point for any organization, including those with limited resources to address cybersecurity challenges. They help to set priorities so that an organization gets the greatest value out of its efforts to manage ransomware risks. Much depends on how sophisticated your current operations are in terms of cybersecurity risk management. While there are many other things that can and should be done to combat ransomware, it is important to recognize that you don’t need to do everything all at once.

©2022 Tom Brooks (P)2022 Tom Brooks
Security & Encryption Computer Security Hacking Risk Management
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Getting Started with Cybersecurity Risk Management | Ransomware

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.