Select Your Favourite
Category And Start Learning.

( 0 Review )

New

Small Firm Cybersecurity Checklist

Free

( 0 Review )

Course Level

Intermediate

Video Tutorials

2

Free

Course content

2 Lessons

Section 1- Identify and Assess Risks: Inventory

SUMMARY
Section 1- Identify and Assess Risks: Inventory

Section 2- Identify and Assess Risks: Minimize Use

Description

FINRA’s Report on Cybersecurity Practices

SANS Critical Security Controls for Effective Cyber Defense

Section 1 – Identify and Assess Risks-Inventory
Personally Identifiable information, NIST’s Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (see pages 2-1 and 2-2)

Inventory of PII and Firm Sensitive Information, please see FINRA’s Report on Cybersecurity Practices (see pages 12-13)

Section 2 – Identify and Assess Risks-Minimize Use
Minimizing Collection of PII, NIST’s Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (see pages 4-3)

Section 3 – Identify and Assess Risks-Third Party
Vendor Management, FINRA’s Report on Cybersecurity Practices (see pages 26-30)
AICPA’s Reporting on Controls at a Service Organization

Questions to ask third parties who access your PII and Firm sensitive information, Standards Information Gathering (SIG) questionnaire (lite version) that firms can use to collect information on vendors

Section 4 – Protect-Information Assets
Malware Prevention, NIST’s Guide to Malware Incident Prevention and Handling (see pages 3.1-3.17)

Password Strength Tips, SANS Consensus Policy Resource Community – Password Protection Policy

Section 5 – Protect-System Assets
Identifying Critical Assets to Protect, FINRA’s Report on Cybersecurity Practices for a discussion on conducting the inventory (see page 12)

Section 6 – Protect-Encryption
Understanding Encryption, FINRA’s Report on Cybersecurity Practices (see pages 20-21)

Section 7 – Protect-Employees Devices
Securing Mobile Devices, SANS Institute on Cybersecurity The Critical Security Controls for Effective Cyber Defense Version 5.0 (see page 19)

Section 8 – Protect- Controls and Staff Training
Vendor Management, FINRA’s Report on Cybersecurity Practices (see pages 31-33)

Section 9 – Detect-Penetration Testing
Conducting Penetration Testing, NIST’s Technical Guide to Information Security Testing and Assessment
FINRA’s Report on Cybersecurity Practices (see pages 21-22)

Section 10 – Detect-Intrusion
Intrusion Detection System, NIST’s (draft) Guide to Intrusion Detection and Prevention Systems (IDPS)

Section 11 – Response Plan
Issues to Consider when Developing a Response Plan, FINRA’s Report on Cybersecurity Practice (see pages 23-25)

Section 12 – Recovery
Eradication of Cyber breach and Recovery, NIST’s Computer Security Incident Handling Guide (see pages 35-37)

What to learn?

BENEFITS

Requirements

  • REQUIREMENTS

Target Audience

  • TARGET AUDIENCE

Instructor

4.44 /5

16 Courses

Free

Material Includes

  • MATERIALS

Share

Share: