23 April 2025 Cybersecurity Resources for Business Analysts Posted by AssistKD News Editor Cybersecurity Resources for BAs We hope you find this list of cybersecurity and risk resources for BAs and Business Change professionals useful. With thanks to cybersecurity experts Bindu Channaveerappa and Mark Cross, and AssistKD's Pete Thompson for their advice and input. CoursesAssistKD Cybersecurity One Day Workshop AI Awareness One Day Workshop Articles and Workshop OutputEmbracing a Security Mindset: The Next Frontier of Business AnalysisBusiness analysis and cybersecurity BA Brew PodcastsBA Brew 63: The AI Brew (Hosted by ChatGPT)BA Brew 95: Cybersecurity and Business Analysis (Feat. Bindu Channaveerappa) Links (Last updated April 2025)ENISA (European Union Agency for Cybersecurity)https://www.enisa.europa.eu/CISA (Cybersecurity and Infrastructure Security Agency) https://www.cisa.gov/NIST (National Institute of Standards and Technology)https://www.nist.gov/cyberframeworkISO (ISO/IEC 27001 Information Security Framework)https://www.iso.org/isoiec-27001-information-security.htmlhttps://www.iso.org/iso-31000-risk-management.htmlhttps://www.iso.org/standard/39066.html(ISC) ² (The International Information System Security Certification Consortium)https://www.isc2.org/ISSA® (Information Systems Security Association) https://www.issa.org/NCSC (National Cyber Security Centre) GuidanceAI and cyber security: what you need to know - NCSC.GOV.UKMcKinsey Insights https://www.mckinsey.com/business-functions/mckinsey-digital/mckinsey-technology/overview/cybersecurity Books and PeriodicalsBCS Cyber Security and Business Analysis Book CISO MAG (CISO Magazine) BCS Cyber Security The Complete Guide to Cyber Threats and Protection BookOWASP Foundation The 10 Most Critical Web Application Security Risks eBook Bindu Channaveerappa is the Author of ‘Cyber Security and Business Analysis: An essential guide to secure and robust systems’ published by BCS Publishing. The book offers practical guidance for analysts to extend their analysis and deliverables to include cyber security requirements throughout the project delivery lifecycle. It includes tools, techniques, frameworks, and real-life case studies.Mark Cross has been working in IT transformation for 25 years specialising in cloud transformation, data migration, information protection and cybersecurity. He is the founder and principal consultant of Envista Consulting and serves on the committee of the IIBA UK North Branch. Pete Thompson is a Director at AssistKD, consultant, examiner, trainer, author, mentor and coach. He has expertise in business analysis and solution delivery, with software development as a specialism. Pete is the author of Defining Digital Solutions, published by BCS Publishing, the first in a comprehensive three book series on Digital Solutions. Share this page