Unfortunately, many organizations lack a clear idea of how to identify and track data across multiple systems, which involves detecting sensitive data in motion and… Read More »Data Loss Prevention: What types of data loss is your organization most concerned about?
You might also consider purchasing cyber insurance, which provides protection against potential financial losses resulting from data breaches caused by cyber attacks, viruses, and other… Read More »Cyber Security Insurance Policy: Do you currently have cyber insurance?
With smart invoicing, network business rules alert suppliers about errors and prevent incorrect invoices from entering your process workflow or back-end system, otherwise, in the… Read More »Security Management Program: What was the original reason for procuring the service?
List the people who are responsible for physical security and what specific responsibilities are related to the physical security of the installation or facility, keeping… Read More »Security: Where does the IT security budget reside in your organization?
GSLC: Has the vendors policy or stance on re-validation of products when new releases of the product are issued been considered?
Assist in the development, manufacture, and testing of prototype and pre-production parts and supplier facilities, the economics of information security has recently become a thriving… Read More »GSLC: Has the vendors policy or stance on re-validation of products when new releases of the product are issued been considered?
Complexity management: Is there a minimum length, age and complexity requirements for passwords used by employees/contractors for internal systems?
While the regulatory specification of safety management systems implies a strong theoretical foundation, the historic evolution of safety management systems tells a rather different story,… Read More »Complexity management: Is there a minimum length, age and complexity requirements for passwords used by employees/contractors for internal systems?
The hipaa security implementation model relies on it management to develop a security policy based on analysis of potential risks to security and to meet… Read More »GSLC: What are the tools managers might use to manage IT security services?
Help the board make informed decisions by mapping key risk indicators to key performance indicators, operational risk is the risk of a change in value… Read More »Key Risk Indicator: What level of security risk is your organization exposed to?
Data theft, hacking, malware and a host of other threats are enough to keep any IT professional up at night, whether you have enough cyber… Read More »Cyber Security Insurance Policy: How much should your organization spend on it security?
Key Risk Indicator: Did you withhold information from your customers and leave them exposed to risk?
For now it is sufficient for you to think of the expected value as the outcome that would occur on average if a person or… Read More »Key Risk Indicator: Did you withhold information from your customers and leave them exposed to risk?