Telegram Group & Telegram Channel
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.

ID.AM-6 Checklist:
1. 📜 Define cybersecurity roles
- Example: Clearly specify the roles of a Security Officer, Network Administrator, and other relevant positions.
2. 🤝 Establish responsibilities for third-party stakeholders
- Example: Outline security responsibilities for suppliers, customers, and partners in contracts and SLAs.
3. 🎯 Create a cybersecurity training program
- Example: Develop a curriculum to train employees in their respective cybersecurity roles and responsibilities.

---
📚 Consolidated Relevant Standards:

- CIS CSC: 1, 2, 12, 13, 14, 17, 19
- COBIT 5: APO01.02, APO02.02, APO03.03, APO03.04, APO07.06, APO10.04, APO12.01, APO13.01, BAI04.02, BAI09.01, BAI09.02, BAI09.05, DSS01.02, DSS05.02, DSS06.03
- ISA 62443: 2-1:2009 4.2.3.4, 4.2.3.6, 4.3.2.3.3; 3-3:2013 SR 7.8
- ISO/IEC 27001: A.6.1.1, A.8.1.1, A.8.1.2, A.8.2.1, A.11.2.6, A.12.5.1, A.13.2.1, A.13.2.2
- NIST SP 800-53 Rev. 4: AC-4, AC-20, CA-3, CA-9, CM-8, CP-2, PL-8, PM-5, PM-11, PS-7, RA-2, SA-9, SA-14, SC-6
---

So there you have it, folks! A thorough look at Asset Management in cybersecurity audits, now complete with real-world examples and references to industry standards. Go ahead and check your current setup against these guidelines. Trust me, you'll sleep better at night! 😴

Stay secure, Cyber Warriors! 🛡️⚔️



tg-me.com/IT_Audit/344
Create:
Last Update:

- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.

ID.AM-6 Checklist:
1. 📜 Define cybersecurity roles
- Example: Clearly specify the roles of a Security Officer, Network Administrator, and other relevant positions.
2. 🤝 Establish responsibilities for third-party stakeholders
- Example: Outline security responsibilities for suppliers, customers, and partners in contracts and SLAs.
3. 🎯 Create a cybersecurity training program
- Example: Develop a curriculum to train employees in their respective cybersecurity roles and responsibilities.

---
📚 Consolidated Relevant Standards:

- CIS CSC: 1, 2, 12, 13, 14, 17, 19
- COBIT 5: APO01.02, APO02.02, APO03.03, APO03.04, APO07.06, APO10.04, APO12.01, APO13.01, BAI04.02, BAI09.01, BAI09.02, BAI09.05, DSS01.02, DSS05.02, DSS06.03
- ISA 62443: 2-1:2009 4.2.3.4, 4.2.3.6, 4.3.2.3.3; 3-3:2013 SR 7.8
- ISO/IEC 27001: A.6.1.1, A.8.1.1, A.8.1.2, A.8.2.1, A.11.2.6, A.12.5.1, A.13.2.1, A.13.2.2
- NIST SP 800-53 Rev. 4: AC-4, AC-20, CA-3, CA-9, CM-8, CP-2, PL-8, PM-5, PM-11, PS-7, RA-2, SA-9, SA-14, SC-6
---

So there you have it, folks! A thorough look at Asset Management in cybersecurity audits, now complete with real-world examples and references to industry standards. Go ahead and check your current setup against these guidelines. Trust me, you'll sleep better at night! 😴

Stay secure, Cyber Warriors! 🛡️⚔️

BY IT Audit and Governance


Warning: Undefined variable $i in /var/www/tg-me/post.php on line 280

Share with your friend now:
tg-me.com/IT_Audit/344

View MORE
Open in Telegram


IT Audit and Governance Telegram | DID YOU KNOW?

Date: |

How to Use Bitcoin?

n the U.S. people generally use Bitcoin as an alternative investment, helping diversify a portfolio apart from stocks and bonds. You can also use Bitcoin to make purchases, but the number of vendors that accept the cryptocurrency is still limited. Big companies that accept Bitcoin include Overstock, AT&T and Twitch. You may also find that some small local retailers or certain websites take Bitcoin, but you’ll have to do some digging. That said, PayPal has announced that it will enable cryptocurrency as a funding source for purchases this year, financing purchases by automatically converting crypto holdings to fiat currency for users. “They have 346 million users and they’re connected to 26 million merchants,” says Spencer Montgomery, founder of Uinta Crypto Consulting. “It’s huge.”

Telegram Auto-Delete Messages in Any Chat

Some messages aren’t supposed to last forever. There are some Telegram groups and conversations where it’s best if messages are automatically deleted in a day or a week. Here’s how to auto-delete messages in any Telegram chat. You can enable the auto-delete feature on a per-chat basis. It works for both one-on-one conversations and group chats. Previously, you needed to use the Secret Chat feature to automatically delete messages after a set time. At the time of writing, you can choose to automatically delete messages after a day or a week. Telegram starts the timer once they are sent, not after they are read. This won’t affect the messages that were sent before enabling the feature.

IT Audit and Governance from id


Telegram IT Audit and Governance
FROM USA