Cryptographic Controls
It is often challenging for even the most tech-savvy boards and company executives to keep up with the scope and pace of developments and risks related to big data, social media, cloud computing, IT implementations, cyber risk, and other technology matters. These developments carry a complex set of risks, and the most serious among them can compromise sensitive information and significantly disrupt business processes and the company’s reputation. Oversight of an Information Security Management System (ISMS) requires proactive engagement and is often the responsibility of the board. In some organisations, a level of oversight may be delegated to a board Information Technology and Systems (ITS) sub-committee. By engaging in regular dialogue with the CIO, CISO, and other technology-focused leaders, the ITS committee can help business leaders determine where attention should be focused. Although information security is frequently on the board’s agenda, ITS committees are increasingly looking for ways to confirm that the governance processes to manage information are appropriate for the company’s needs and working effectively.
Showing 1–12 of 67 results
-
Assessment of IT Application Controls
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Basic Assessment of IT Application Management
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Digital Security Controls Checklist
$75.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Eligible Data Breach Guideline
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for Cyber Security Incident Response
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for Electronic Messaging
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for IT Implementing Segmentation and Segregation
$75.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for Password Construction
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for Remote Access to Operational Tech. Environments
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for Travelling Overseas with IT Devices
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
Guidelines for Web Conferencing Security
$50.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
-
ICT Equipment Register
$30.00 Add to cartDisclaimer: Any policies, procedures, guidelines, templates, or information provided on the GRCReady website are offered as general guidance only and should be used as a reference. It may not take into account all relevant or festate deral laws and is not a legal document. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information.
Showing 1–12 of 67 results