Skip to Main Content
Cybersecurity and Privacy Law Handbook
book

Cybersecurity and Privacy Law Handbook

by Walter Rocchi
December 2022
Beginner to intermediate content levelBeginner to intermediate
230 pages
6h 32m
English
Packt Publishing
Content preview from Cybersecurity and Privacy Law Handbook

2

Mandatory Requirements

In the previous chapter, we spent some time learning what frameworks are and how we can use them to populate these frames (ISO 27001, NIST and so on)

In this chapter, if you were brave enough to follow me through all those acronyms and uncommon wording, you are probably eager to find out what’s next. We will spend the next pages learning how ISO 27001 works in the real world, then we will do the same for the NIST framework, and finally, we will see whether ISO 27001 and NIST can coexist.

In this chapter, we will cover the following topics:

  • iSMS, controls, commitment, context, scope policy, and objectives
  • Identify, Protect, Detect, Respond, and Recover
  • Can ISO 27001 and NIST coexist?

iSMS, controls, commitment, context, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Privacy, Regulations, and Cybersecurity

Privacy, Regulations, and Cybersecurity

Chris Moschovitis

Publisher Resources

ISBN: 9781803242415