December 2020
Intermediate to advanced
361 pages
6h 26m
English
This part of the book explains how you can use the CRF to guide your cyber security project, in an eight-step approach that has been put together based on best practice and our tried-and-tested methodology for implementing information security management systems (ISMS).
However, you may have a different preferred method for implementing projects such as this one, or you may want to make slight adjustments to our eight-step approach. For instance, if you just want to be cyber secure, and are not pressured by a specific legal or contractual requirement, it may be better to first conduct a risk assessment (step 6, chapter 23) before you define your target state (step 4, chapter 21).