Creating a Structure for Cyber Risk Management

Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Bank Director 2017-10, Vol.27 (4), p.48-48
1. Verfasser: Browne, Brian
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 48
container_issue 4
container_start_page 48
container_title Bank Director
container_volume 27
creator Browne, Brian
description Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_1977751200</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1977751200</sourcerecordid><originalsourceid>FETCH-proquest_reports_19777512003</originalsourceid><addsrcrecordid>eNpjYeA0NDA30DU3MzTkYOAqLs4yMDA0MTU14mTQcy5KTSzJzEtXSFQILikqTS4pLUpVSMsvUnCuTEotUgjKLM5W8E3MS0xPzU3NK-FhYE1LzClO5YXS3AxKbq4hzh66BUX5haWpxSXxRakF-UUlxfGGlubm5qaGRgYGxkQpAgD4yzCS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1977751200</pqid></control><display><type>article</type><title>Creating a Structure for Cyber Risk Management</title><source>Business Source Complete</source><creator>Browne, Brian</creator><creatorcontrib>Browne, Brian</creatorcontrib><description>Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.</description><identifier>ISSN: 1070-7611</identifier><language>eng</language><publisher>Brentwood: Bank Director</publisher><subject>Audits ; Cybersecurity ; Data integrity ; Directors ; Executives ; Handbooks ; Internal auditors ; Risk management</subject><ispartof>Bank Director, 2017-10, Vol.27 (4), p.48-48</ispartof><rights>Copyright Bank Director Fourth Quarter 2017</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>313,781,785,792</link.rule.ids></links><search><creatorcontrib>Browne, Brian</creatorcontrib><title>Creating a Structure for Cyber Risk Management</title><title>Bank Director</title><description>Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.</description><subject>Audits</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Directors</subject><subject>Executives</subject><subject>Handbooks</subject><subject>Internal auditors</subject><subject>Risk management</subject><issn>1070-7611</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpjYeA0NDA30DU3MzTkYOAqLs4yMDA0MTU14mTQcy5KTSzJzEtXSFQILikqTS4pLUpVSMsvUnCuTEotUgjKLM5W8E3MS0xPzU3NK-FhYE1LzClO5YXS3AxKbq4hzh66BUX5haWpxSXxRakF-UUlxfGGlubm5qaGRgYGxkQpAgD4yzCS</recordid><startdate>20171001</startdate><enddate>20171001</enddate><creator>Browne, Brian</creator><general>Bank Director</general><scope>3V.</scope><scope>4S-</scope><scope>4T-</scope><scope>7XB</scope><scope>885</scope><scope>8AO</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ANIOZ</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRAZJ</scope><scope>FRNLG</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>M1F</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20171001</creationdate><title>Creating a Structure for Cyber Risk Management</title><author>Browne, Brian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_19777512003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Audits</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Directors</topic><topic>Executives</topic><topic>Handbooks</topic><topic>Internal auditors</topic><topic>Risk management</topic><toplevel>online_resources</toplevel><creatorcontrib>Browne, Brian</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>BPIR.com Limited</collection><collection>Docstoc</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Banking Information Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Accounting, Tax &amp; Banking Collection</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Accounting, Tax &amp; Banking Collection (Alumni)</collection><collection>Business Premium Collection (Alumni)</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Banking Information Database</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Bank Director</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Browne, Brian</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Creating a Structure for Cyber Risk Management</atitle><jtitle>Bank Director</jtitle><date>2017-10-01</date><risdate>2017</risdate><volume>27</volume><issue>4</issue><spage>48</spage><epage>48</epage><pages>48-48</pages><issn>1070-7611</issn><abstract>Some areas of emphasis for this principle: * Table Top Exercises: As a result of the varied manners in which company executives have handled data breaches at their organizations, it has become clear that proper incident response planning is not just a necessity for IT staff and management, but also for corporate executives and directors. The NACD handbook recommends that directors participate in simulations or table top exercises to become familiar with their incident response procedures and communication approach. * Board Minutes: Formal board meeting minutes should reflect when cyber risk issues are on the agenda or discussed, whether by the full board or key committees. In lieu of adding single purpose directors with cybersecurity expertise, boards can close this gap in other ways: * Deep dive briefings or examinations * Leveraging existing independent advisors, such as external auditors and outside counsel * Participating in director education programs Cyber Risk Management Framework Directors should set the expectation that management will adopt an enterprise wide cyber risk management framework with adequate staffing and budget.</abstract><cop>Brentwood</cop><pub>Bank Director</pub></addata></record>
fulltext fulltext
identifier ISSN: 1070-7611
ispartof Bank Director, 2017-10, Vol.27 (4), p.48-48
issn 1070-7611
language eng
recordid cdi_proquest_reports_1977751200
source Business Source Complete
subjects Audits
Cybersecurity
Data integrity
Directors
Executives
Handbooks
Internal auditors
Risk management
title Creating a Structure for Cyber Risk Management
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-11T13%3A37%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Creating%20a%20Structure%20for%20Cyber%20Risk%20Management&rft.jtitle=Bank%20Director&rft.au=Browne,%20Brian&rft.date=2017-10-01&rft.volume=27&rft.issue=4&rft.spage=48&rft.epage=48&rft.pages=48-48&rft.issn=1070-7611&rft_id=info:doi/&rft_dat=%3Cproquest%3E1977751200%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1977751200&rft_id=info:pmid/&rfr_iscdi=true