S3SS10N Wednesday – Cyber Compliance

Join Cybrary

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here
< Back to S3SS10NS

S3SS10N Wednesday – Cyber Compliance

Published: November 23, 2016 | By: Claude Williams | Views: 5174
This post has been saved to your profile

This Weeks S3SS10N Wednesday

This session covers cyber compliance and modern trends in the field. Today, the trend is to make cyber security a requirement for each and every organization. The roots of cyber security come from Information Technology (IT) and the need to keep it secure, which also produced information assurance and information security. We are at a point when the government is emphasizing cyber security and companies and companies must start thinking about compliance; specifically:

  • Regulation
  • Laws

Participants also learn about the roots of cyber security and compliance and how they started in the DoD which then spread out to highly regulated industries. Participants learn about the four components of cyber security (ITSM):

  • Information
  • Technology
  • Service
  • Management

Whiteboard Notes

Click Image to View a Larger Version
< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

Claude Williams
Claude has been in the "Cyber" and IT industry for over a decade and knows the value of learning the importance of security and compliance regulations. His company, CyNtelligent Solutions (http://cyntell.com/), offers Cyber Compliance solutions for public and private sectors.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
  1. Well presented and knowledgeable info.

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?