Check out ALL our 75+ Free Giveaways of 2017. These are all exclusive promotions we ran on LinkedIn through 2017.
  This is a partial preview. View large preview.
If you are logged in, your referral link [?] is automatically included below.
EMBED CODE (Copy and Paste)


BENEFITS OF DOCUMENT
  1. Diagnose Cyber Security Risk Management projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices.
  2. Implement evidence-based best practice strategies aligned with overall goals.
  3. Integrate recent advances in Cyber Security Risk Management and process design strategies into practice according to best practice guidelines.

DOCUMENT DESCRIPTION

National Institute of Standards and Technology (NIST) U.S. Department of Commerce Cyber Security Framework Aligned.

Governments, sectors, and organizations around the world are increasingly recognizing the NIST Cyber Security Framework (CSF) as a recommended cyber security baseline to help improve the cyber security risk management and resilience of their systems.

This Self Assessment provides conformance to the NIST CSF risk management practices, allowing you to properly protect your data.

The Cyber Security Risk Management Self-Assessment will make you a Cyber Security Risk Management domain expert by:

1. Reducing the effort in the Cyber Security Risk Management work to be done to get problems solved
2. Ensuring that plans of action include every Cyber Security Risk Management task and that every Cyber Security Risk Management outcome is in place
3. Saving time investigating strategic and tactical options and ensuring Cyber Security Risk Management opportunity costs are low
4. Delivering tailored Cyber Security Risk Management advise instantly with structured going-forward plans.

All the tools you need to an in-depth Cyber Security Risk Management Self-Assessment. Featuring 913 new and updated case-based criteria, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Cyber Security Risk Management improvements can be made.

The Self Assessment tool is a comprehensive dashboard built in MS Excel. It ensures you don't miss anything with 913 criteria in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1-10 participants.

The above preview showcases an example of a completed version. The secondary document includes a blank template, as well as a detailed 140+ page PDF guide. The guide provides a convenient way to distribute and share among the participants to prepare and discuss the Self Assessment.

Got a question about the product? Email us at [email protected] or ask the author directly by using the form to the right. If you cannot view the preview above this document description, go here to view the large preview instead.

Source: Assessment Dashboard - Cyber Security Risk Management Excel document

This document is part of the following Business Toolkit:

Cyber Security View Details
 

Assessment Dashboard - Cyber Security Risk Management

Sold by Gerard Blokdijk (this author has 10 documents)

$79.00

ALL FEES INCLUDED
Add to Cart
  

This business document is categorized under the function(s): Information Technology  

It applies to All Industries.

File Type: Excel (xlsx)

File Size: 460.8 KB

Purchase includes lifetime product updates. After your purchase, you will receive an email to download this document.

This product contains a supplemental ZIP document.

Initial upload date (first version): Oct 26, 2017
Most recent version published: Oct 30, 2017

Ask the Author a Question

Must be logged in Click here to log in

Report

SELECT CUSTOMERS

Flevy has provided quality business documents to businesses and organizations of all sizes across the world—in over 60 countries. Below is just a very small sample of our customer base.

VIEW BY


Are you a business professional?
Join Flevy and sell your business documents.

Just as the mobile apps market has helped software developers earn sustainable, passive income, we hope Flevy will do the same for business professionals, like yourself. There's no reason to let your IP collect dust when it can be making you perpetual income.


CUSTOMERS ALSO BOUGHT THESE DOCUMENTS

Digital Transformation Strategy
Listed under:  Information Technology  Strategy, Marketing, & Sales
View more from: LearnPPT   Top Flevy Author [?]
118-slide PowerPoint deck. Digital Transformation is being embraced by companies across most industries, as the role of technology shifts from being a business enabler to a business driver. Transformation is driven by 6 Technology Trends: - Social Media - [read more]
$89.00

Add to Cart View Details

Management Guide to Fighting Cyber Predators
Listed under:  Governance, Risk, & Compliance
View more from: Boris Agranovich
11-page Word document. Our objective is to provide structure and guidance to those who wish to protect themselves and their organizations from the predators that are present in cyber space. Our approach has three basic assumptions: 1. Known cyber risks [read more]
$39.00

Add to Cart View Details

Cyber Security Awareness Program
15-page PDF document and supporting Word. Organizations need to put effort behind influencing and encouraging employees to be safe on-line, because employees in many industries, spend a lot of their time accessing data. Improving attitudes towards information security can be [read more]
$25.00

Add to Cart View Details

Project Prioritization Tool
Listed under:  Information Technology  Operations
View more from: Demand Metric   Top Flevy Author [?]
Excel workbook. The Project Prioritization Tool can be used to rank projects based on their company strategic fit, economic impact, and feasibility. The tool works by allowing you to create a rational method to force rank each project where you define and [read more]
$49.95

Add to Cart View Details

ITIL Service Level Management (SLM) Workflow - Process Guide
Listed under:  Information Technology  ITIL
View more from: Ivana Nissen
66-page Word document. This document establishes a Service Level Management (SLM) process according to ITIL best practice and ISO 20000. (Word document including Visio diagram of the process) This document introduces the Service Level [read more]
$50.00

Add to Cart View Details

IT Strategy
Listed under:  Information Technology
View more from: LearnPPT   Top Flevy Author [?]
30-slide PowerPoint deck. This is a comprehensive document on Information Technology (IT) / Management Information Systems (MIS) Strategy. This document includes IT strategy frameworks, critical success factors, detailed project approach and [read more]
$39.00

Add to Cart View Details

ITIL Service Catalogue Template
Listed under:  Information Technology
View more from: Dartview Consulting   Top Flevy Author [?]
11-page Word document. This document is based on ITIL v3 and provides a template for a detailed Service Catalogue. A Service Catalogue is one of the three elements of an IT Service Providers, Service Portfolio. The Service Portfolio is the complete set of [read more]
$30.00

Add to Cart View Details

ISO 27001/27002 Security Audit Questionnaire
Listed under:  Information Technology  Operations
View more from: John Kyriazoglou
Excel workbook. This spreadsheet contains a set of security questions and an evaluation method, which could be used to support your efforts in assessing whether your company complies with the requirements of ISO Security standard ISO 27001/27002. It is [read more]
$50.00

Add to Cart View Details

ITIL Incident Management Workflow - Process Guide
Listed under:  Information Technology  ITIL
View more from: Ivana Nissen
68-page Word document. This document establishes an Incident Management (IM) process according to ITIL v3 best practice and ISO 20000. (Word document including Visio diagram of the process) This document introduces the Incident Management [read more]
$50.00

Add to Cart View Details

ITIL Incident Management Process
Listed under:  Information Technology  ITIL
View more from: Ivana Nissen
32-slide PowerPoint deck and supporting PDF. ITIL Incident Management Process is essential Process in Service Support. Process is contained in ITIL Service Operation book. Document describes the process in detail including very detailed description of Process flow steps. Other than [read more]
$25.00

Add to Cart View Details

What project are you working on?
Cyber Security?   Bain Presentations?   Supply Chain Analysis?   Or something else.
Have a look at our holistic Business Toolkits. We have over 250+ toolkits covering a wide range of business topics.