*(ISC)² Members/Associates can access this course for free by logging into your Member Portal for more information.
This article explores the strategies that can be used by organizations of all sizes and industries to mitigate the risks associated with cyber threats and protect sensitive data, systems, and networks.
A cybersecurity strategy is not a one-time effort, but an ongoing process. From establishing an information security policy to understanding the threat landscape, organizations should continuously evaluate and update their security controls and incident response procedures to adapt to emerging threats and risks. This article also explains how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy without having to start from scratch.
- • Essential cybersecurity tools and techniques
- • Response plans and system recovery plans
- • Managing systems and configurations
- • Training employees to understand and embrace your security policies
CPE credits earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.
Members: Starting January 1st, 2022, CPE Credits for (ISC)² credentials will be reported by Member Services on the 1st of every month. Please allow 10 business days for processing. Courses completed prior to 1/1/2022 will need to be self-reported by members and associates through the (ISC)² CPE Portal accessible via www.isc2.org using your member login credentials.
For specific questions related to your CPE credits or the CPE portal please contact member support - email@example.com