Cyber Essentials
A Pocket Guide
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。
-
ナレーター:
-
Liam Gerrard
-
著者:
-
Alan Calder
このコンテンツについて
Protect your business with Cyber Essentials.
“The book will be good for organisations wishing to get certified against the Cyber Essentials scheme, but it also [contains] lots of practical advice. Its brief nature makes it very suitable for reminding IT staff about general good practices, and it won’t take too long to read.” (Claire Agutter, lead tutor, ITSM Zone)
Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyberattacks, carried out with tools that are freely available on the Internet. Cyber Essentials is the UK government's reaction to the proliferation of these attacks. It requires that organizations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cybercriminals.
Ensure access to government contracts.
From October 1, 2014, all suppliers bidding for a range of government ICT contracts - in particular, contracts requiring the handling of sensitive and personal information - must be certified to the scheme.
Take your first step to certification.
Cyber Essentials: A Pocket Guide will help you to:
- Understand the requirements of the scheme
- Implement the controls correctly
- Realize when you are ready to seek certification
- Get a grip on both the certification process and the distinction between Cyber Essentials and Cyber Essentials Plus
- Find additional help and resources
Cyber Essentials certification will provide numerous benefits, including the opportunity to tender for business where certification to the scheme may be a prerequisite, reducing insurance premiums, and helping to improve investor and customer confidence.
This guide explains how to achieve certification to Cyber Essentials in a fast, effective, and cost-effective manner.
Contents:
- Introduction
- Part one - Requirements for basic technical protection from cyberattacks
- Part two - Assurance framework
- Part three - Further assistance
About the author: Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice, and consultancy firm that helps company boards tackle IT governance, risk management, compliance, and information security issues. He has many years of senior management experience in the private and public sectors.
©2014 IT Governance Publishing (P)2018 IT Governance Publishing