{"id":8,"date":"2022-11-03T15:36:46","date_gmt":"2022-11-03T19:36:46","guid":{"rendered":"https:\/\/community.mis.temple.edu\/jdaniel\/blog\/points\/netcom-learning-webinar-getting-started-with-5-fundamental-domains-of-cybersecurity-governance\/"},"modified":"2022-11-03T15:36:46","modified_gmt":"2022-11-03T19:36:46","slug":"netcom-learning-webinar-getting-started-with-5-fundamental-domains-of-cybersecurity-governance","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/jdaniel\/points\/netcom-learning-webinar-getting-started-with-5-fundamental-domains-of-cybersecurity-governance\/","title":{"rendered":"NetCom Learning Webinar || Getting started with 5 fundamental domains of cybersecurity governance"},"content":{"rendered":"<p>This webinar informed me about cyber security domains for modern issues with information security.<\/p>\n<p>(Some of the notes I&#8217;ve written down)<\/p>\n<p>Although this aspect might be simple, security has three layers that each require specific attention<\/p>\n<ul>\n<li>Management, Physical, and Technical. (with cyber security focusing on the technical aspect).<\/li>\n<\/ul>\n<p>The speaker elaborated upon how important risk assessment\/analysis of assets are. These assessment results are how organizations proceed with managing a specific risk<\/p>\n<ul>\n<li>Quantitative analysis uses numbers to determine the designated value of assets. (like physical technology)<\/li>\n<li>Qualitative analysis may use a risk matrix to associate risk with an assets<\/li>\n<\/ul>\n<p>Depending on the organization some would have to take extra precaution when dealing with suppliers. Supplier vulnerability affects your organizations vulnerability through association<\/p>\n<ul>\n<li>Its important to check through suppliers information security standards before starting or continuing business with them.<\/li>\n<\/ul>\n<p>In addition There are a number of regulations and compliances that are required for businesses using sensitive information. Failure to meet these regulations could result in the termination of your organization.<\/p>\n<ul>\n<li>PCI contracts, CCPA, HIPAA, and GDPR standards<\/li>\n<\/ul>\n","protected":false},"author":28046,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/points\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/users\/28046"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/points\/8\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}