UsefulLinks
Computer Science
Cybersecurity
Information Security Management and Auditing
1. Introduction to Information Security Management
2. Information Security Risk Management
3. Information Security Management Systems (ISMS)
4. Security Control Implementation
5. Business Continuity and Incident Management
6. Information Security Auditing Fundamentals
7. Audit Execution and Evidence Collection
8. Audit Reporting and Follow-up
9. Regulatory Compliance and Legal Requirements
10. Security Frameworks and Standards
11. Specialized Security Auditing Areas
12. Emerging Technologies and Future Considerations
9.
Regulatory Compliance and Legal Requirements
9.1.
Compliance Framework Development
9.1.1.
Regulatory Landscape Analysis
9.1.2.
Compliance Program Structure
9.1.3.
Compliance Risk Assessment
9.1.4.
Compliance Monitoring Systems
9.2.
Major Regulatory Requirements
9.2.1.
General Data Protection Regulation (GDPR)
9.2.1.1.
Data Protection Principles
9.2.1.2.
Individual Rights
9.2.1.3.
Data Breach Notification
9.2.1.4.
Privacy Impact Assessments
9.2.1.5.
Data Protection Officer Requirements
9.2.2.
Health Insurance Portability and Accountability Act (HIPAA)
9.2.2.1.
Privacy Rule Requirements
9.2.2.2.
Security Rule Standards
9.2.2.3.
Breach Notification Rule
9.2.2.4.
Business Associate Agreements
9.2.3.
Sarbanes-Oxley Act (SOX)
9.2.3.1.
Internal Control Requirements
9.2.3.2.
IT General Controls
9.2.3.3.
Application Controls
9.2.3.4.
Management Assessment
9.2.4.
Payment Card Industry Data Security Standard (PCI DSS)
9.2.4.1.
PCI DSS Requirements
9.2.4.2.
Compliance Validation Methods
9.2.4.3.
Merchant Levels and Requirements
9.2.4.4.
Service Provider Requirements
9.2.5.
Gramm-Leach-Bliley Act (GLBA)
9.2.5.1.
Safeguards Rule
9.2.5.2.
Privacy Rule
9.2.5.3.
Pretexting Provisions
9.3.
Industry-Specific Regulations
9.3.1.
Financial Services Regulations
9.3.2.
Healthcare Regulations
9.3.3.
Government and Defense Requirements
9.3.4.
Critical Infrastructure Protection
9.4.
Compliance Auditing
9.4.1.
Compliance Assessment Methods
9.4.2.
Regulatory Audit Preparation
9.4.3.
Compliance Gap Analysis
9.4.4.
Remediation Planning
Previous
8. Audit Reporting and Follow-up
Go to top
Next
10. Security Frameworks and Standards