AAA of Security
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting
The different agreement types you'll encounter when working in Cybersecurity
Wearing two hats
Confidentiality, Integrity, and Availability
Adherence to laws, regulations, standards, and policies
Laws protecting against computer crimes
COBIT, ISO 27001, NIST 800-53, etc.
Current performance versus desired performance
Overall management of the organization's IT resources
Policies, Standards, Procedures, and Guidelins
GDPR, HIPAA,PCI DSS, etc.
Protecting the legal rights if creators and owners
Managing and Prioritizing Risks
CIS, ISO, NIST etc.
Identify, assess, and prioritize risk
Physical, Technical, Administrative, etc.
Policies, procedures, and controls
GDPR, HIPAA,PCI DSS, etc.
Summary of cybersecurity terms
The ISC2 Code of Ethics
No one should be trusted by default