Information and Cyber Security GRC: Compliance with External Factors
This course will teach you to identify, categorize, and apply laws, regulations, and standards to meet external requirements.
What you'll learn
How does an organization maintain compliance with a seemingly endless list of external requirements? In this course, Information and Cyber Security GRC: Compliance With External Factors, you’ll learn to identify, categorize, and apply laws, regulations, and standards to meet external requirements. First, you’ll explore the impact of laws and regulations on compliance. Next, you’ll discover contractual and voluntary compliance standards. Finally, you’ll learn how to interpret privacy and data protection laws and standards. When you’re finished with this course, you’ll have the skills and knowledge of compliance with external external factors needed to identify, categorize, and apply laws, regulations, and standards to meet external requirements.
Table of contents
- Types of Compliance Directives 4m
- Ex-ante and Ex-post Enforcement 2m
- Similarities and Differences of Legal and Regulatory Compliance 3m
- EU NIS Description, Goals, and Risks 4m
- Compliance Driven Risk Appetite and Tolerance 3m
- HIPPA Description, Goals, and Risks 4m
- SOX Description, Goals, and Risks 3m
- GLBA Description, Goals, and Risks 4m
- FISMA Description, Goals, and Risks 4m
- Compare and Contrast Contractual and Voluntary Compliance 2m
- Materiality and Redress with Breach of Contract 5m
- Contrast of Relying and Asserting Party Objectives 6m
- PCI DSS Description, Goals, and Risks 3m
- SWIFT CSCF Description, Goals, and Risks 3m
- CMMC Description, Goals, and Risks 3m
- FFIEC Description, Goals, and Risks 3m
- HITRUST Description, Goals, and Risks 2m
- Baseline, Assessment, and Control Frameworks 3m