Useful Links
Computer Science
Cybersecurity
Information Security Management and Auditing
1. Introduction to Information Security Management
2. Information Security Risk Management
3. Information Security Management Systems (ISMS)
4. Security Control Implementation
5. Business Continuity and Incident Management
6. Information Security Auditing Fundamentals
7. Audit Execution and Evidence Collection
8. Audit Reporting and Follow-up
9. Regulatory Compliance and Legal Requirements
10. Security Frameworks and Standards
11. Specialized Security Auditing Areas
12. Emerging Technologies and Future Considerations
Regulatory Compliance and Legal Requirements
Compliance Framework Development
Regulatory Landscape Analysis
Compliance Program Structure
Compliance Risk Assessment
Compliance Monitoring Systems
Major Regulatory Requirements
General Data Protection Regulation (GDPR)
Data Protection Principles
Individual Rights
Data Breach Notification
Privacy Impact Assessments
Data Protection Officer Requirements
Health Insurance Portability and Accountability Act (HIPAA)
Privacy Rule Requirements
Security Rule Standards
Breach Notification Rule
Business Associate Agreements
Sarbanes-Oxley Act (SOX)
Internal Control Requirements
IT General Controls
Application Controls
Management Assessment
Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS Requirements
Compliance Validation Methods
Merchant Levels and Requirements
Service Provider Requirements
Gramm-Leach-Bliley Act (GLBA)
Safeguards Rule
Privacy Rule
Pretexting Provisions
Industry-Specific Regulations
Financial Services Regulations
Healthcare Regulations
Government and Defense Requirements
Critical Infrastructure Protection
Compliance Auditing
Compliance Assessment Methods
Regulatory Audit Preparation
Compliance Gap Analysis
Remediation Planning
Previous
8. Audit Reporting and Follow-up
Go to top
Next
10. Security Frameworks and Standards