The expert's guide to
Directory
ISO 27001
This guide provides an authoritative and detailed overview of the ISO/IEC 27001 standard, which defines the requirements for an Information Security Management..
MoreRight Fit For Risk (RFFR)
The Right Fit For Risk (RFFR) Guide is an authoritative guide that provides individuals and organizations with the tools and knowledge they need to make.. MorePCI-DSS
This comprehensive guide provides a comprehensive overview of the Payment Card Industry Data Security Standard (PCI-DSS), a set of security standards designed..
MoreNIST Cybersecurity Framework (CSF)
This authoritative guide provides an overview of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). The guide will.. MoreInformation Security Management System (ISMS)
This guide provides a comprehensive overview of Information Security Management Systems (ISMS), which are designed to protect organizations from the risks for.. MoreASD Essential 8
This authoritative guide provides an in-depth look at the ASD Essential 8 (E8), a set of eight measures developed by the Australian Signals Directorate (ASD).. MoreFedRAMP
This guide provides a comprehensive overview of the Federal Risk and Authorization Management Program (FedRAMP). It covers the program's requirements,.. MoreDefence Industry Security Program (DISP)
This comprehensive guide provides a comprehensive overview of the Defence Industry Security Program (DISP), which is the security program for the defence.. MoreEnterprise Risk Management
This authoritative guide provides an overview of enterprise risk management (ERM) and its essential components. It is designed to help business leaders.. MoreRegulatory Compliance
This guide provides an overview of the key principles and strategies for successful compliance management. Learn how to navigate regulatory requirements,.. MoreAustralian Financial Services Compliance
This guide provides an authoritative overview of the compliance requirements for financial services companies in Australia. It covers the regulations and.. MoreVulnerability Management
Introducing the expert's guide to Vulnerability Management
This Vulnerability Management Guide provides an authoritative overview of the processes, strategies,.. MoreCybersecurity Compliance
This guide provides a comprehensive overview of the fundamentals of cybersecurity compliance. It covers the most important aspects of compliance, including.. MoreSOC 2
This comprehensive guide provides an in-depth look at SOC 2, a set of standards used to assess the security, availability, processing integrity,.. MoreNIST SP 800-53
This authoritative guide is based on the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, which provides guidance for.. MoreISO 27000
This authoritative guide provides an in-depth overview of the International Organization for Standardization (ISO) 27000 Series, which is a set of standards.. MoreNIST SP 800-171
The NIST SP 800-171 Guide is an authoritative source of information for organizations looking to ensure the security of their Controlled Unclassified.. MoreHITRUST Common Security Framework
This authoritative guide provides an in-depth overview of the HITRUST Common Security Framework (CSF). It examines the components of the HITRUST CSF, including.. MoreCenter for Internet Security (CIS) Framework
This authoritative guide provides an overview of the Center for Internet Security (CIS) Framework and its associated best practices for organizations of all.. MoreMITRE ATT&CK
This comprehensive guide provides an in-depth exploration of the MITRE ATT&CK framework. It covers the fundamentals of the framework, its components, and how.. MoreENISA National Capabilities Assessment Framework
This guide provides an overview of the European Union Agency for Network and Information Security (ENISA) National Capabilities Assessment Framework. It.. MoreUK Cyber Essentials
This authoritative guide provides an in-depth look at the UK Cyber Essentials program, a set of security standards designed to protect organisations from cyber.. MoreGDPR
This GDPR Guide provides a comprehensive overview of the European Union's General Data Protection Regulation (GDPR). It covers the full scope of the GDPR,.. MoreGRC Software
This authoritative guide provides a comprehensive overview of Governance, Risk, and Compliance (GRC) software. It covers the basics of GRC software, including.. MoreInformation Security Registered Assessors Program (IRAP)
This authoritative guide provides a comprehensive overview of the Infosec Registered Assessors Program (IRAP) and the Australian Government Information..
MoreVendor Risk Management
This Vendor Risk Management Guide provides a comprehensive overview of the key components of vendor risk management. It covers the fundamentals of vendor risk.. MoreAPRA CPS 234
The APRA CPS 234 Guide provides authoritative guidance to help organizations implement effective cybersecurity strategies. Written by the Australian Prudential.. MoreCybersecurity Risk Management
This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective.. MoreEnvironmental, Social, and Governance (ESG)
This authoritative guide provides an in-depth look at Environmental, Social, and Governance (ESG) principles and their impact on the success of organizations... MoreCMMC
This guide provides an authoritative overview of the Cybersecurity Maturity Model Certification (CMMC) program. It explains the five levels of CMMC, the.. MoreISO 27017
In today's interconnected world, cloud computing has become an integral part of business operations. However, with the numerous advantages of cloud technology,..
MoreFederated GRC
This expert guide explores the challenges of managing risk and compliance in federated organizations. We also delve into insights provided by renowned GRC..
MoreResponsible AI
Artificial Intelligence (AI) and Machine Learning (ML) have become integral parts of the modern technological landscape, revolutionizing how we interact with..
More