Supply Chain Risk Management Supply Chain Risk Management
Internal Audit and IT Audit

Supply Chain Risk Management

Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Ken Sigler and Others
    • $124.99
    • $124.99

Publisher Description

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

GENRE
Business & Personal Finance
RELEASED
2017
7 November
LANGUAGE
EN
English
LENGTH
278
Pages
PUBLISHER
CRC Press
SELLER
Taylor & Francis Group
SIZE
9.8
MB

More Books Like This

CMMI-ACQ CMMI-ACQ
2008
One Business Management System: Whatever You Do, Do It for Your Stakeholders One Business Management System: Whatever You Do, Do It for Your Stakeholders
2018
Competitive Advantage: Linked Management Systems Competitive Advantage: Linked Management Systems
2011
SOC for Supply Chain SOC for Supply Chain
2020
Information Security Governance Information Security Governance
2018
ISO 9001:2015 Handbook for Small and Medium-Sized Businesses ISO 9001:2015 Handbook for Small and Medium-Sized Businesses
2015

More Books by Ken Sigler, Dan Shoemaker & Anne Kohnke

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
2018
The Cybersecurity Body of Knowledge The Cybersecurity Body of Knowledge
2020
How to Build a Cyber-Resilient Organization How to Build a Cyber-Resilient Organization
2018

Other Books in This Series

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
2018
Strong Security Governance through Integration and Automation Strong Security Governance through Integration and Automation
2021
Operational Auditing Operational Auditing
2021
The Audit Value Factor The Audit Value Factor
2019
Blockchain for Cybersecurity and Privacy Blockchain for Cybersecurity and Privacy
2020
The Complete Guide for CISA Examination Preparation The Complete Guide for CISA Examination Preparation
2020