Elevating Your Audit Strategy: Insights from the CRF Audit Framework

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=iS-Qx4dDaDU



Duration: 0:00
282 views
17


In this webcast, James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, offers an in-depth exploration of the Cybersecurity Risk Foundation's Audit Framework (AF), providing a structured approach to cybersecurity audits that not only meet compliance requirements but are also intricately aligned with their organization's cybersecurity goals. Gain comprehensive insights into formulating an audit program that bridges the technical aspects of cybersecurity with overarching business objectives, ensuring a balanced and effective strategy.




Other Videos By SANS Institute


2024-09-23Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
2024-09-23Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D
2024-09-23Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA
2024-09-23AI in Medical Diagnostics | Rob T. Lee and James Lyne
2024-09-23Crisis Management in Healthcare | Steve Armstrong-Godwin
2024-09-23Enhanced Vendor Risk Assessment | Tony Turner
2024-09-23Tools for Simplifying Regulatory Requirements for Risk Assessment | James Tarala
2024-09-19Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond
2024-09-12SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
2024-09-12SANS Compliance Countdown 2024
2024-08-29Elevating Your Audit Strategy: Insights from the CRF Audit Framework
2024-08-26SANS Live Training: Security West 2024 Recap
2024-08-16Navigating the Path to Zero Trust in 2024
2024-08-06A Winning Partnership in Cybersecurity Talent Development
2024-08-02SANS | GIAC Workforce Report Outcomes Panel Conversation
2024-08-01Breaking Barriers: Christine Morency’s Inspirational Cybersecurity Journey
2024-08-01Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey
2024-07-29Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
2024-07-24Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
2024-07-23How to Attract, Hire and Retain Mid-Level Cybersecurity Roles
2024-07-20Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8