Practical Cybersecurity, Privacy, and Compliance (a presentation)
This webpage accompanies a presentation by John Bandler on October 26, 2022, titled Practical Cybersecurity and Privacy: Law, Action, Compliance, and Governance. This talk will not be recorded.
Small and medium sized businesses need to protect themselves from cybercrime, comply with growing legal requirements on cybersecurity, data breach notification and privacy, and (of course) ensure they achieve their mission. In this presentation we will cover practical aspects, including Bandler's Three Platforms to Connect for compliance and the Five Components for Policy Work.
Webinar materials and reference include
Law resources
- Cybersecurity Laws and Regulations 1 (Part 1 of 2), https://johnbandler.com/cybersecurity-laws-and-regulations-1/
- Privacy, https://johnbandler.com/privacy/
- Introduction to Law (outline), https://johnbandler.com/introduction-to-law-outline/
- My new course on Udemy, “Introduction to Law”, https://www.udemy.com/course/introduction-to-law/
- Intellectual Property Law - An Introduction, https://johnbandler.com/intellectual-property-law/
Cybersecurity and cybercrime resources
- Introduction to Cybersecurity and Information Security, https://johnbandler.com/introduction-cybersecurity-information-security/
- Cybersecurity Tips from John Bandler (single page tip sheet), https://johnbandler.com/cybersecurity-tips-from-john-bandler/
- Cybersecurity forms for the home or small office, https://johnbandler.com/cybersecurity-asset-inventory-forms-for-the-home/
- The Three Priority Cybercrime Threats, https://johnbandler.com/priority-cybercrime-threats/
- Bandler's Four Pillars of Cybersecurity, https://johnbandler.com/bandlers-four-pillars-of-cybersecurity/
- Free Cybersecurity Policy, https://johnbandler.com/cybersecurity-policy-free-version/
- Cybersecurity review and improvement for your organization - a checklist, https://johnbandler.com/cybersecurity-review-improvement/
- The Three Priority Cybercrime Threats
Cybersecurity related forms you can use to identify and list the information assets in your home or small organization.
- Form 1: Cybersecurity Forms Explained and Checklist
- Form 2: Personal Primary Device and Data Account Summary
- Form 3: Personal Data summary
- Form 4: Home Device (computer) Inventory
- Form 5: Personal Email & Internet Account Inventory
- Form 6: Network and Internet Summary
Governance and policy work
- Free Cybersecurity Policy, https://johnbandler.com/cybersecurity-policy-free-version/
- Policies and procedures, https://johnbandler.com/policies-and-procedures/
- Internal Rules, https://johnbandler.com/internal-rules/
- Bandler’s Five Components for Policy Work, https://johnbandler.com/five-components-for-policy-work/
- Bandler's Three Platforms to Connect (for compliance), https://johnbandler.com/bandlers-three-platforms-to-connect/
- Bandler's Fourth Platform to Connect, https://johnbandler.com/bandlers-fourth-platform-to-connect/
- Policy and Procedure Research and References, https://johnbandler.com/policy-and-procedure-references/
- Policy Checklist, https://johnbandler.com/policy-checklist/
John's online courses on privacy and law
This landing page is hosted at https://johnbandler.com/practical-cybersecurity-privacy-presentation-2022-10-26, copyright John Bandler, all rights reserved.
Posted 10/25/2022. Updated 10/26/2022.