Peacock, J. (2020, September 21). Infographic: The CIS top 20 controls explained. Security Boulevard. This resource highlights the top CIS security controls program use by
organizations and government agencies.
Center for Internet Security. (2017, January 12). Privacy implications guide for the CIS controls (version 6). This resource outlines privacy concerns that an organization should focus on, regardless of size. Focus on reading tables (pp. 6-19).
Media, F. (2019, May 22). The foundation common to most security frameworks: Addressing configuration controls. Distributed Energy. This resource highlights the essence of critical security controls to the organization and how it can be used to reduce risk levels and prevent or mitigate cyber-attacks.
Wolford, B. (2019, February 13). What is GDPR, the EU's new data protection law? GDPR.EU This resource gives an overview of how to understand GDPR law and how to determine what part of it applies to the organization.
Harris, K. (2016, February). California data breach report. State of California Department of Justice. This resource highlights the results of breaches across all sectors and outlined privacy laws that should be adopted by the healthcare sector. Focus on reading the Executive Summary (pp. 21 -22; and pp. 37-38).
State of Nevada, Department of Public Safety. (2018). Nevada office of cyber defense coordination annual report. This resource outlines cyber-attack statistics in Nevada across all industries and five main strategies, including controls and countermeasures to improve its unique cybersecurity posture. Focus reading the Executive Summary (pp. 4, 8-9, and 13-14).
Brumfield, C. (2019, August 08). 11 new state privacy and security laws
explained: Is your business ready? This resource highlights states that have recently enacted privacy, data security, cybersecurity, and data breach notification laws to mitigate cyber threats and attacks.