CSOL 550- Management and Cyber Security was one of my favorite classes because I learned crucial financial elements such as budgeting for security costs and presenting it to the C-suite to develop my leadership skills further.
Valuable Resources
Infocyte. (2019). A Practical Guide to Building a Cyber Incident Response Team - Infocyte.
Infocyte. Retrieved from https://www.infocyte.com/blog/2019/09/04/a-practical-guide-to-building-a-cyber-incident-response-team/.
Kolochenko, I. (2015). How to calculate ROI and justify your cybersecurity budget. CSO Online.
Retrieved from https://www.csoonline.com/article/3010007/how-to-calculate-roi-and-justify-your-cybersecurity-budget.html.
National Institute of Standards and Technology. (2006). Retrieved from
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf.
Swanson, M., Hash, J., & Bowen, P. (2006). Retrieved from
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf.
TOGAF. (2018). Risk Management. Pubs.opengroup.org. Retrieved from
https://pubs.opengroup.org/architecture/togaf9-doc/m/chap27.html.
Touhill, G., & Touhill, C. (2014). Cybersecurity for Executives.
Valuable Resources
Infocyte. (2019). A Practical Guide to Building a Cyber Incident Response Team - Infocyte.
Infocyte. Retrieved from https://www.infocyte.com/blog/2019/09/04/a-practical-guide-to-building-a-cyber-incident-response-team/.
Kolochenko, I. (2015). How to calculate ROI and justify your cybersecurity budget. CSO Online.
Retrieved from https://www.csoonline.com/article/3010007/how-to-calculate-roi-and-justify-your-cybersecurity-budget.html.
National Institute of Standards and Technology. (2006). Retrieved from
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf.
Swanson, M., Hash, J., & Bowen, P. (2006). Retrieved from
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf.
TOGAF. (2018). Risk Management. Pubs.opengroup.org. Retrieved from
https://pubs.opengroup.org/architecture/togaf9-doc/m/chap27.html.
Touhill, G., & Touhill, C. (2014). Cybersecurity for Executives.