Stern, D. E. (2019, November 6). DoD's new cybersecurity compliance program . . . What you need to know. This resource highlights the who, what, when, where, why, and how that organizations need to know about the CMMC framework.
Rose, S. W., Borchert, O., Mitchell, S., & Connelly, S. (2020, August 11). Zero Trust Architecture. This resource defines zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture. Focus reading on abstract and pages 32 -35.
Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST Cybersecurity Framework on shaping reasonable national and international cybersecurity practices. Texas International Law Journal, 50(2), 303–353. This resource analyzes the emerging cybersecurity duty of care and examines the potential impact of the 2014 National Institute of Standards and Technology (NIST) Cybersecurity Framework on shaping reasonable standards of cybersecurity at the global level.
Drivas, G., Chatzopoulou, A., Maglaras, L., Lambrinoudakis, C., Cook, A., & Janicke, H. (2020). A NIS directive compliant cybersecurity maturity assessment framework. 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 1641–1646. This resource describes a novel Cybersecurity Maturity Assessment Framework (CMAF) that is tailored to the NIS Directive requirements.
Wu, X., & Liang, H. (2020). Exploration research on the model of government regulation based on compliance management system. 2020 6th International Conference on Information Management (ICIM), Information Management (ICIM), 117–121. This resource introduced the compliance management method into government regulation to regulatory challenges facing by the government.
Baruch, D. W., Wollenberg, J. M., & Kaplan, K. S. (2019). Cybersecurity compliance and the False Claims Act. Journal of Internet Law, 23(1), 3–8. This resource provides a brief background of the False Claims Act and recent cybersecurity requirements being imposed on those doing business with the government and information on three False Claims Act cases involving cybersecurity compliance allegations.