1. Cybersecurity Implementation Methodology
2. Gap Analysis Required by the Law
3. Identifying Critical Network Information Infrastructure
4. Necessary Cybersecurity Control Measures for General Network
5. Necessary Security Controls in Critical Information Infrastructure
6. Cybersecurity Systems Implementation Procedures with Reference to NIST Cybersecurity Framework
“This law greatly aids China’s ability to improve information security awareness and strengthens protections over sensitive data,” said Matt Loeb, ISACA CEO. “China’s National Cybersecurity Law is just one example of how more countries are working toward having more rigorous cybersecurity protections.”
The Guide to China’s Regulatory Cybersecurity Implementation Framework is available to members for US $30 and non-members for US $60 and can be purchased at: www.isaca.org/china-csx.
For additional information on cyber framework implementation, ISACA recommends the following:
- COBIT 5 for Information Security
- Implementing the NIST Cybersecurity Framework
- Implementing the NIST Cybersecurity Framework Using COBIT 5
About ISACA
Nearing its 50th year, ISACA® (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its 450,000 engaged professionals in information and cybersecurity, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI® Institute, to help advance innovation through technology. ISACA has a presence in more than 188 countries, including more than 217 chapters worldwide and offices in both the United States and China.
Twitter: www.twitter.com/ISACANews