Cybersecurity & Data Protection Governance

Mechanisms exist to facilitate the implementation of cybersecurity & data protection governance controls.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to coordinate cybersecurity, data protection and business alignment through a steering committee or advisory board, comprised of key cybersecurity, data privacy and business executives, which meets formally and on a regular basis.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data protection program.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to establish, maintain and disseminate cybersecurity & data protection policies, standards and procedures.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to review the cybersecurity & data privacy program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to assign one or more qualified individuals with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data protection program.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.


Login

Cybersecurity & Data Protection Governance

Mechanisms exist to develop, report and monitor cybersecurity & data privacy program measures of performance.


Login