6Chapter 1: Introduction to cyber security GRC
27Introduction and overviewv
7Background to GRC
28Identifying cyber risks and controls
8The three lines of defence model
29Third-party service providers
9What is the relevance of GRC to cyber?
30Protecting against cyber risks
10Chapter 2: Cyber security governance
31Summary
11Introduction and overview
32Chapter 5: Responding to an attack
12Culture and awareness
33Introduction and overview
13Threat and risk awareness
34Preparing for cyber attacks
14Risk management
35Detecting potential cyber attacks
15Responding to cyber incidents
36Recovery following a cyber attack
16Cyber SOX
37Summary
17Summary: key cyber security questions for directors to ask
38Chapter 6: Cyber compliance
18Chapter 3: Cyber security risk management
39Overview and introduction
19Introduction and overview
40Cyber compliance requirements
20Risk management scoping
41Summary
21Process and control mapping
42Closing Credits