Board serving champion
|
|
Board serving champion
|
|
Regular reporting on cyber issues
|
|
Regular reporting on cyber issues
|
|
Risk register include cyber risk entries
|
|
Risk register include cyber risk entries
|
|
Asset register records data assets
|
|
Asset register records data assets
|
|
Assets are categorised in terms of criticality
|
|
Assets are categorised in terms of criticality
|
|
Information systems drive cyber risk assessments
|
|
Information systems drive cyber risk assessments
|
|
Systems drive your cyber security plan
|
|
Systems drive your cyber security plan
|
|
IT budget as a percent of revenue
|
|
IT budget as a percent of revenue
|
|
Separate budgets for IT and cyber security
|
|
Separate budgets for IT and cyber security
|
|
Segregation of duties when making payments
|
|
Segregation of duties when making payments
|
|
Requests to change payee details
|
|
Requests to change payee details
|
|
Do you assure automated payments
|
|
Do you assure automated payments
|
|
Ratio of IT staff to end users
|
|
Ratio of IT staff to end users
|
|
Key staff both attain and maintain cyber skills
|
|
Key staff both attain and maintain cyber skills
|
|
You ensure staff are aware of fraud threats
|
|
You ensure staff are aware of fraud threats
|
|
Version levels managed on your IT platforms
|
|
Version levels managed on your IT platforms
|
|
Hosting vendors provide assurance of updates
|
|
Hosting vendors provide assurance of updates
|
|