Tag: governance risk and compliance (GRC)

  • Incident Response Plan – IRP

    Introduction An incident response plan (IRP) is your team’s playbook for how to respond to security incidents. It should be a living document that’s constantly updated and tested, and it should include both instructions on how to detect an incident, as well as what happens after one occurs. What is an Incident Response Plan (IRP)?…

  • Information Security Governance – Constraints

    Introduction There are many different security policy constraints to consider when defining and implementing information security policies. The most important ones are legal requirements and regulatory requirements, physical constraints, and organizational structure. In this article, we will summarize these constraints and discuss their impact on developing an effective information security governance framework. Legal and regulatory…

  • Information Security Policy

    Introduction This is a detailed information security policy for your organization. Goal The goal of this policy is to protect the organization’s information assets by establishing a framework for protecting information, including physical and logical controls. This policy will help you: Scope The scope of this policy is to ensure the protection of information and…

  • Corporate Governance

    Introduction Corporate governance is the system of organizational structures, processes, and relations by which corporations are directed and controlled. Corporate governance includes mechanisms for accountability and tools for ensuring that those who are supposed to be accountable are acting in the corporation’s best interests. Strategic direction A company’s strategic direction is the overall direction it…

  • Information Security Compliance

    Introduction Compliance is a shared responsibility. Internal Influence The first step in achieving compliance is ensuring that your organization has a robust security program. The following areas should be addressed, at a minimum: External Influence External Influence External influence is the most direct and obvious way to ensure your security program is aligned with best…