This is a sample checklist for basic cybersecurity considerations.
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
Check out this sample policy developed by Exterro. In this resource we take a look at a basic incident and breach management process.
This is a glossary of Information Governance terms.
This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.
By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.