Vulnerability Management
It is often challenging for even the most tech-savvy boards and company executives to keep up with the scope and pace of developments and risks related to big data, social media, cloud computing, IT implementations, cyber risk, and other technology matters. These developments carry a complex set of risks, and the most serious among them can compromise sensitive information and significantly disrupt business processes and the company’s reputation. Oversight of an Information Security Management System (ISMS) requires proactive engagement and is often the responsibility of the board. In some organisations, a level of oversight may be delegated to a board Information Technology and Systems (ITS) sub-committee. By engaging in regular dialogue with the CIO, CISO, and other technology-focused leaders, the ITS committee can help business leaders determine where attention should be focused. Although information security is frequently on the board’s agenda, ITS committees are increasingly looking for ways to confirm that the governance processes to manage information are appropriate for the company’s needs and working effectively.
Showing 1–12 of 101 results
-
Assessment of IT Application Controls
$50.00 Add to cart -
Basic Assessment of IT Application Management
$50.00 Add to cart -
Best Practices for Cyber Resilience
$75.00 Add to cart -
Charter for Information Security Committee
$50.00 Add to cart -
Cyber Health Check Questionnaire
$75.00 Add to cart -
Cyber/Information Security Self-Assessment
$75.00 Add to cart -
Digital Security Controls Checklist
$75.00 Add to cart -
Disaster Recovery Plan
$150.00 Add to cart -
Guide to Creating Strong and Safe Passwords
$30.00 Add to cart -
Guidelines for Assessing Security Vulnerabilities & Applying Patches
$50.00 Add to cart -
Guidelines for Cyber Supply Chain Risk Management
$30.00 Add to cart
Showing 1–12 of 101 results