Cybersecurity risk governance structure:
Considerations for cybersecurity policy:
Developing a cybersecurity policy:
Involves normal risk management procedures – identification, quantification, prioritisation of risks, costing, selection and implementation of counter measures and drawing up contingency plans
Risks management for vendors and business partners:
Strategic perspective of managing risks from vendors and business partners:
Cybersecurity risk procedures should identify macro-level risks from third parties:
Operational perspective of managing risks from vendors and business partners:
Financial perspective of managing risks from vendors and business partners:
CIMA strategies to avoid being hacked:
What is the Internet of things?
* Internet of things = network connecting objects in the physical world to the internet Examples: * Smart TV’s * Fitness trackers * Utilities meters * Kitchen appliances
Risks of internet of things:
How should org’s communicate cybersecurity policies?
BPP’s cybersecurity risk management program:
Protection against malware:
What is legacy systems?
Systems that have grown organically over time rather than being specifically designed
What is a patch?
Software update that addresses know vulnerabilities (bug fix)
Patch management:
What does encryption involve?
Encryption techniques:
Firewalls:
Email policies:
Logical access systems prevents access by measures such as:
Passwords:
Back-up controls:
Disaster planning: