GovernanceInformation Security GovernanceInformation Security Management StructureSizingManagement StructurePrinciples of Information SecurityThe CIA TriadSecurity Vulnerabilities, Threats, Risks, and ExposuresCyberattack ElementsDefense-In-DepthRisk ManagementRisk Management ProgramBest Practice Frameworks for Risk ManagementManagement and Technical Information Security ElementsSecurity Program PlanSecurity Policies, Standards, and GuidelinesAsset SecurityIdentity and Access ManagementSecurity EngineeringPhysical SecuritySecurity OperationsSoftware Development SecuritySecurity Assessments and TestingSecurity Training and AwarenessBusiness Continuity and Disaster RecoveryComplianceCompliance TeamCompliance ManagementPrivacyPrivacy Impact AssessmentPrivacy and SecurityLaws and Regulatory DriversFederal Information Security Modernization ActDefense Federal Acquisition Regulation Supplement 252.204-7012Clinger-Cohen ActPayment Card Industry Data Security StandardPrivacy Act of 1974Gramm-Leach-Bliley ActHealth Insurance Portability and Accountability ActFamily Educational Rights and Privacy ActSarbanes-Oxley ActGeneral Data Protection RegulationNorth American Electric Reliability Corporation Critical Infrastructure ProtectionSummary of Laws and Regulatory DriversStandards and FrameworksISO/IEC 27000 SeriesISO/IEC 27001NIST Cybersecurity FrameworkFederal Information Processing StandardsNIST Special PublicationsPrivacy ShieldCOBITInformation Security Trends and Best PracticesOpen Web Application Security ProjectCloud Security AllianceCenter for Internet SecurityInformation Security Training and CertificationsInternational Information System Security Certification ConsortiumISACAInternational Council of E-Commerce ConsultantsSANS InstituteComputing Technology Industry AssociationInternational Association of Privacy ProfessionalsOffensive SecurityEthicsChapter ReviewQuick ReviewQuestionsAnswers