Creating a Structure for Cyber Risk Management
Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also...
Gespeichert in:
Veröffentlicht in: | Bank Director 2017-10, Vol.27 (4), p.48-48 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 48 |
---|---|
container_issue | 4 |
container_start_page | 48 |
container_title | Bank Director |
container_volume | 27 |
creator | Browne, Brian |
description | Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_1977751200</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1977751200</sourcerecordid><originalsourceid>FETCH-proquest_reports_19777512003</originalsourceid><addsrcrecordid>eNpjYeA0NDA30DU3MzTkYOAqLs4yMDA0MTU14mTQcy5KTSzJzEtXSFQILikqTS4pLUpVSMsvUnCuTEotUgjKLM5W8E3MS0xPzU3NK-FhYE1LzClO5YXS3AxKbq4hzh66BUX5haWpxSXxRakF-UUlxfGGlubm5qaGRgYGxkQpAgD4yzCS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1977751200</pqid></control><display><type>article</type><title>Creating a Structure for Cyber Risk Management</title><source>Business Source Complete</source><creator>Browne, Brian</creator><creatorcontrib>Browne, Brian</creatorcontrib><description>Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.</description><identifier>ISSN: 1070-7611</identifier><language>eng</language><publisher>Brentwood: Bank Director</publisher><subject>Audits ; Cybersecurity ; Data integrity ; Directors ; Executives ; Handbooks ; Internal auditors ; Risk management</subject><ispartof>Bank Director, 2017-10, Vol.27 (4), p.48-48</ispartof><rights>Copyright Bank Director Fourth Quarter 2017</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>313,781,785,792</link.rule.ids></links><search><creatorcontrib>Browne, Brian</creatorcontrib><title>Creating a Structure for Cyber Risk Management</title><title>Bank Director</title><description>Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.</description><subject>Audits</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Directors</subject><subject>Executives</subject><subject>Handbooks</subject><subject>Internal auditors</subject><subject>Risk management</subject><issn>1070-7611</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpjYeA0NDA30DU3MzTkYOAqLs4yMDA0MTU14mTQcy5KTSzJzEtXSFQILikqTS4pLUpVSMsvUnCuTEotUgjKLM5W8E3MS0xPzU3NK-FhYE1LzClO5YXS3AxKbq4hzh66BUX5haWpxSXxRakF-UUlxfGGlubm5qaGRgYGxkQpAgD4yzCS</recordid><startdate>20171001</startdate><enddate>20171001</enddate><creator>Browne, Brian</creator><general>Bank Director</general><scope>3V.</scope><scope>4S-</scope><scope>4T-</scope><scope>7XB</scope><scope>885</scope><scope>8AO</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ANIOZ</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRAZJ</scope><scope>FRNLG</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>M1F</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20171001</creationdate><title>Creating a Structure for Cyber Risk Management</title><author>Browne, Brian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_19777512003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Audits</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Directors</topic><topic>Executives</topic><topic>Handbooks</topic><topic>Internal auditors</topic><topic>Risk management</topic><toplevel>online_resources</toplevel><creatorcontrib>Browne, Brian</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>BPIR.com Limited</collection><collection>Docstoc</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Banking Information Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Accounting, Tax & Banking Collection</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Accounting, Tax & Banking Collection (Alumni)</collection><collection>Business Premium Collection (Alumni)</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Banking Information Database</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Bank Director</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Browne, Brian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Creating a Structure for Cyber Risk Management</atitle><jtitle>Bank Director</jtitle><date>2017-10-01</date><risdate>2017</risdate><volume>27</volume><issue>4</issue><spage>48</spage><epage>48</epage><pages>48-48</pages><issn>1070-7611</issn><abstract>Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.</abstract><cop>Brentwood</cop><pub>Bank Director</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1070-7611 |
ispartof | Bank Director, 2017-10, Vol.27 (4), p.48-48 |
issn | 1070-7611 |
language | eng |
recordid | cdi_proquest_reports_1977751200 |
source | Business Source Complete |
subjects | Audits Cybersecurity Data integrity Directors Executives Handbooks Internal auditors Risk management |
title | Creating a Structure for Cyber Risk Management |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-11T13%3A37%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Creating%20a%20Structure%20for%20Cyber%20Risk%20Management&rft.jtitle=Bank%20Director&rft.au=Browne,%20Brian&rft.date=2017-10-01&rft.volume=27&rft.issue=4&rft.spage=48&rft.epage=48&rft.pages=48-48&rft.issn=1070-7611&rft_id=info:doi/&rft_dat=%3Cproquest%3E1977751200%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1977751200&rft_id=info:pmid/&rfr_iscdi=true |