institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk.a process to ensure continued evaluation and updating of security policies, standards procedures, and risk.implementing information security governance how can an organization implement effective security governance ? according to the CGTF, it begins by engaging in a core set activities. in order to buid program suited to their needs, organization should:1. conduct an annual information security evaluation, the results of which the CEO should reviewwith staff and then report to the board of directors2. conduct periodic risk assessments of information assets as part of a risk management program3. implement policies and procedures base on risk assessments to secure information assets.4. establish a security management structure to assign explicit individual roles, responsibilities, authority, and accountability.5. develop plans and initiate action to provide adequate information security for networks, facilities, systems and information.6. treat information security as a integral part of the system life cycle.7. provide information security awareness, training and education to personnel.8. conduct periodic testing and evaluation of the effectives of information security policies and procedures.9. creat and execute a plan for remedial action to address any information security deficiencies.10. develop and implement incident response procedures.11. establish plands, procedures, and tests to provide continuity of operation.12. use security best practices guidance, such as ISO 17799, to measure information security performance.
đang được dịch, vui lòng đợi..
