ITAR and Export Controls Fundamentals: A Guide for Compliance Managers
A comprehensive guide for compliance managers navigating International Traffic in Arms Regulations.
Carl B. Johnson has authored 16 influential books on cybersecurity compliance and best practices, drawing from his extensive experience as a CISO and compliance expert.
A comprehensive guide for compliance managers navigating International Traffic in Arms Regulations.
A step-by-step approach to developing and implementing effective ITAR compliance programs and procedures.
Essential guidance on implementing HIPAA privacy and security requirements for healthcare organizations and administrators.
Strategies and frameworks for protecting your organization from data breaches through proactive security measures.
Practical methods for implementing data classification and protection systems for Controlled Unclassified Information.
Creating and implementing DFARS/NIST 800-171 processes, policies, and procedures to achieve CMMC 2.0 compliance.
A guide for securing Microsoft GCC & GCC High environments to meet Federal security requirements for sensitive data protection.
A must-have resource for CIOs and departmental managers implementing SharePoint governance, with step-by-step guidance on creating air-tight governance plans and aligning with compliance standards.
An eight-book series covering every CISSP exam domain, with real-world examples, memory tricks, and 250 practice questions per book.
Master governance, risk assessment, and compliance fundamentals with practical examples and comprehensive practice questions for CISSP Domain 1 certification success.
Learn data classification, handling, and retention strategies with real-world scenarios and extensive practice questions for CISSP Domain 2 mastery.
Understand security models, system capabilities, and vulnerability assessments through practical examples and comprehensive practice questions for Domain 3 success.
Master network protocols, secure communications, and network security controls with hands-on examples and extensive practice questions for CISSP Domain 4.
Explore identity management, access provisioning, and authentication strategies with practical scenarios and comprehensive practice questions for Domain 5 mastery.
Learn security testing methodologies, vulnerability assessments, and audit procedures with real-world examples and extensive practice questions for Domain 6.
Master incident response, logging, monitoring, and recovery procedures with hands-on examples and comprehensive practice questions for CISSP Domain 7 success.
Understand secure software development lifecycle, application security, and DevSecOps practices with practical examples and extensive questions for Domain 8 mastery.