<!DOCTYPE html>
<html>
<head>
<title>Cyber Security Risk Management Standard Requirements</title>
</head>
<body>
<style type="text/css">#aweber_rem {
text-align:center;
font-size:10px;
color:#333;
width:600px !important;
margin:0px auto;
font-family:Verdana, Arial, Helvetica, san-serif;
}
#aweber_rem a {
text-decoration:none;
}
#aweber_rem a:hover {
text-decoration:underline;
}
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
<tbody>
<tr>
<td style="color:#666666; padding-bottom:5px" valign="bottom" width="400">
<div style="font-size:12px; text-align:right"><span style="font-family:verdana"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></span><br />
<span style="font-size:16px"><span style="color:#000000"><em>Join Canon and Tata Group</em></span></span><br />
<span style="font-family:verdana"><span style="color:#000000"><strong><span style="font-size:18px">Access Our Best Sellers</span></strong></span><br />
<span style="font-size:14px"><strong><span style="color:#000000">Unlimited Access Is Now Yours</span><br />
<br />
<a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/F72892is76y2jQvbsy7TdI1Q/7RBVCTviDEqTu0Al763K06ZA">SUBSCRIBE NOW</a></strong></span></span></div>
<div style="font-size:14px; text-align:right">
<div style="font-size:12px; text-align:right"> </div>
<div style="font-size:12px; text-align:center">
<hr />
<p><span style="color:#000000"><span style="font-size:24px"><strong>Cyber Security Risk Management Standard Requirements Toolkit</strong></span></span><br />
</p>
<span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/k37kRqTqjVQ892qRGLt8Tsnw/7RBVCTviDEqTu0Al763K06ZA"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span><br />
</div>
<p style="text-align:center"><span style="color:#000000"><span style="font-size:20px">Crucial Requirements:</span></span></p>
<ul>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Industry standards enforce legislation that utilities must meet, and these standards do not come cheaply. Standards require additional resources in the form of employees, hours, and technology, all of which increases the cost of providing reliable electricity to the customer. Therefore, the standards of cyber security that protect the customer are then ultimately paid by the customer. So what are these standards and who sets them?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">There are two philosophical approaches to implementing cyber security on an intelligent, networked grid: create a checklist of actions to take that address known security problems or prioritize actions based on continually refreshing the answer to the question, What makes my system more secure? Which approach do you take?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What collaborative organizations or efforts has your company interacted with or become involved with to improve its cyber security posture (such as NESCO, NESCOR, Fusion centers, Infragard, US-CERT, ICS-CERT, E-ISAC, SANS, HSIN, the Cross-Sector Cyber Security Working Group of the National Sector Partnership, etc.)?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Do you analyze the cyber security of the system thoroughly according to the needs of the organization, regulatory guides and related policy recommendations detail the defined goal and the process to obtain cyber security; is the system adequate to fulfill the cyber security requirement?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Cyber attacks are expected to reach unprecedented capability and distribution in the coming years. As cyber weapons become more complex, and deliberate attacks more frequent, how are your security teams taking action now to prevent future victimization?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Do you support the certified cyber security professional and cyber-informed operations and engineering professionals with advanced problem-solving tools, communities of practice, canonical knowledge bases, and other performance support tools?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What is the framework you use for general cyber security certifications that integrate both knowledge and skill while predicting constraints of innate abilities on performance, and do you need specific certifications?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What domains of knowledge and types of cyber security-associated skills and abilities are necessary for engineers involved in operating the organizations processes to achieve safe and reliable operating goals?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Can you describe your organizations policies and procedures governing risk generally and cyber security risk specifically. How does senior management communicate and oversee these policies and procedures?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Are you aware of anyone attempting to gain information in person, by phone, mail, email, etc., regarding the configuration and/or cyber security posture of your website, network, software, or hardware?</span></span><br />
<div style="text-align:left"> </div>
</li>
</ul>
</div>
<div style="text-align:center">
<p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/k37kRqTqjVQ892qRGLt8Tsnw/7RBVCTviDEqTu0Al763K06ZA"><img align="right" alt="" height="900" src="https://cdn6.bigcommerce.com/s-ilcoov/products/150770/images/184186/Cyber_Security_Risk_Management_TKFC__18263.1535493457.1280.1280.jpg?c=2" style="margin:5px" width="600" /></a> </span></span></p>
<p><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/k37kRqTqjVQ892qRGLt8Tsnw/7RBVCTviDEqTu0Al763K06ZA"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span> </span></span></p>
</div>
<hr />
<p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/k37kRqTqjVQ892qRGLt8Tsnw/7RBVCTviDEqTu0Al763K06ZA" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>
<div style="text-align:center">
<div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
</span></span></div>
<div style="text-align:center"><br />
<span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/0mqo9J0Idxv892ABH2mXPHIg/7RBVCTviDEqTu0Al763K06ZA"><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/itil-training-organization-newlogosmall.jpg" width="280" /><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/prince2-training-organization-newlogo-small.jpg" width="280" /></a></span><br />
</span></span>
<p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework: <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/RmCsv7RIFy36etYc3Iv82Q/7RBVCTviDEqTu0Al763K06ZA">https://www.nist.gov/cyberframework/industry-resources</a></p>
<span style="color:#000000"><span style="font-family:verdana"> </span></span>
<hr /></div>
<div style="text-align: center;"><br />
<span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>
<p> </p>
<span style="color:#000000"> </span></div>
</div>
</td>
</tr>
<tr>
<td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px">
<p> </p>
<p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>
<p> </p>
<p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/7RBVCTviDEqTu0Al763K06ZA" >Manage Subscription</a> </p>
<p> </p>
</td>
</tr>
</tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/7RBVCTviDEqTu0Al763K06ZA/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>