4
Risk Management, Threat Modeling, SCRM, and SETA
This chapter is about risk management, threat modeling, Supply Chain Risk Management (SCRM), and Security, Education, Training and Awareness, commonly referred to as SETA. For risk management, you’ll review how to apply risk management concepts. You will look into threat modeling concepts and methodologies and SCRM concepts. Finally, you will examine SETA programs.
By the end of this chapter, you will be able to answer questions on:
- Understanding and apply risk management concepts
- Understanding and apply threat modeling concepts and methodologies
- Applying Supply Chain Risk Management (SCRM) concepts
- Establishing and maintain a security education, training and awareness program
Will we start ...
Get Certified Information Systems Security Professional (CISSP) Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.