Security Monitoring
It is often challenging for even the most tech-savvy boards and company executives to keep up with the scope and pace of developments and risks related to big data, social media, cloud computing, IT implementations, cyber risk, and other technology matters. These developments carry a complex set of risks, and the most serious among them can compromise sensitive information and significantly disrupt business processes and the company’s reputation. Oversight of an Information Security Management System (ISMS) requires proactive engagement and is often the responsibility of the board. In some organisations, a level of oversight may be delegated to a board Information Technology and Systems (ITS) sub-committee. By engaging in regular dialogue with the CIO, CISO, and other technology-focused leaders, the ITS committee can help business leaders determine where attention should be focused. Although information security is frequently on the board’s agenda, ITS committees are increasingly looking for ways to confirm that the governance processes to manage information are appropriate for the company’s needs and working effectively.
Showing 1–12 of 111 results
-
Assessment of IT Application Controls
$50.00 Add to cart -
Audit Program for Cyber Security
$250.00 Add to cart -
Audit Checklist for IT System Security Maintenance
$75.00 Add to cart -
Audit Program for Information Security
$150.00 Add to cart -
Audit Program for Safeguarding Customer Data
$75.00 Add to cart -
Basic Assessment of IT Application Management
$50.00 Add to cart -
Best Practices for Cyber Resilience
$75.00 Add to cart -
Board ICT Questionnaire
$75.00 Add to cart -
Charter for Information Security Committee
$50.00 Add to cart -
Cyber Health Check Questionnaire
$75.00 Add to cart
Showing 1–12 of 111 results