Telegram Group & Telegram Channel
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.

ID.AM-6 Checklist:
1. 📜 Define cybersecurity roles
- Example: Clearly specify the roles of a Security Officer, Network Administrator, and other relevant positions.
2. 🤝 Establish responsibilities for third-party stakeholders
- Example: Outline security responsibilities for suppliers, customers, and partners in contracts and SLAs.
3. 🎯 Create a cybersecurity training program
- Example: Develop a curriculum to train employees in their respective cybersecurity roles and responsibilities.

---
📚 Consolidated Relevant Standards:

- CIS CSC: 1, 2, 12, 13, 14, 17, 19
- COBIT 5: APO01.02, APO02.02, APO03.03, APO03.04, APO07.06, APO10.04, APO12.01, APO13.01, BAI04.02, BAI09.01, BAI09.02, BAI09.05, DSS01.02, DSS05.02, DSS06.03
- ISA 62443: 2-1:2009 4.2.3.4, 4.2.3.6, 4.3.2.3.3; 3-3:2013 SR 7.8
- ISO/IEC 27001: A.6.1.1, A.8.1.1, A.8.1.2, A.8.2.1, A.11.2.6, A.12.5.1, A.13.2.1, A.13.2.2
- NIST SP 800-53 Rev. 4: AC-4, AC-20, CA-3, CA-9, CM-8, CP-2, PL-8, PM-5, PM-11, PS-7, RA-2, SA-9, SA-14, SC-6
---

So there you have it, folks! A thorough look at Asset Management in cybersecurity audits, now complete with real-world examples and references to industry standards. Go ahead and check your current setup against these guidelines. Trust me, you'll sleep better at night! 😴

Stay secure, Cyber Warriors! 🛡️⚔️



tg-me.com/IT_Audit/344
Create:
Last Update:

- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.

ID.AM-6 Checklist:
1. 📜 Define cybersecurity roles
- Example: Clearly specify the roles of a Security Officer, Network Administrator, and other relevant positions.
2. 🤝 Establish responsibilities for third-party stakeholders
- Example: Outline security responsibilities for suppliers, customers, and partners in contracts and SLAs.
3. 🎯 Create a cybersecurity training program
- Example: Develop a curriculum to train employees in their respective cybersecurity roles and responsibilities.

---
📚 Consolidated Relevant Standards:

- CIS CSC: 1, 2, 12, 13, 14, 17, 19
- COBIT 5: APO01.02, APO02.02, APO03.03, APO03.04, APO07.06, APO10.04, APO12.01, APO13.01, BAI04.02, BAI09.01, BAI09.02, BAI09.05, DSS01.02, DSS05.02, DSS06.03
- ISA 62443: 2-1:2009 4.2.3.4, 4.2.3.6, 4.3.2.3.3; 3-3:2013 SR 7.8
- ISO/IEC 27001: A.6.1.1, A.8.1.1, A.8.1.2, A.8.2.1, A.11.2.6, A.12.5.1, A.13.2.1, A.13.2.2
- NIST SP 800-53 Rev. 4: AC-4, AC-20, CA-3, CA-9, CM-8, CP-2, PL-8, PM-5, PM-11, PS-7, RA-2, SA-9, SA-14, SC-6
---

So there you have it, folks! A thorough look at Asset Management in cybersecurity audits, now complete with real-world examples and references to industry standards. Go ahead and check your current setup against these guidelines. Trust me, you'll sleep better at night! 😴

Stay secure, Cyber Warriors! 🛡️⚔️

BY IT Audit and Governance


Warning: Undefined variable $i in /var/www/tg-me/post.php on line 280

Share with your friend now:
tg-me.com/IT_Audit/344

View MORE
Open in Telegram


IT Audit and Governance Telegram | DID YOU KNOW?

Date: |

Telegram auto-delete message, expiring invites, and more

elegram is updating its messaging app with options for auto-deleting messages, expiring invite links, and new unlimited groups, the company shared in a blog post. Much like Signal, Telegram received a burst of new users in the confusion over WhatsApp’s privacy policy and now the company is adopting features that were already part of its competitors’ apps, features which offer more security and privacy. Auto-deleting messages were already possible in Telegram’s encrypted Secret Chats, but this new update for iOS and Android adds the option to make messages disappear in any kind of chat. Auto-delete can be enabled inside of chats, and set to delete either 24 hours or seven days after messages are sent. Auto-delete won’t remove every message though; if a message was sent before the feature was turned on, it’ll stick around. Telegram’s competitors have had similar features: WhatsApp introduced a feature in 2020 and Signal has had disappearing messages since at least 2016.

That strategy is the acquisition of a value-priced company by a growth company. Using the growth company's higher-priced stock for the acquisition can produce outsized revenue and earnings growth. Even better is the use of cash, particularly in a growth period when financial aggressiveness is accepted and even positively viewed.he key public rationale behind this strategy is synergy - the 1+1=3 view. In many cases, synergy does occur and is valuable. However, in other cases, particularly as the strategy gains popularity, it doesn't. Joining two different organizations, workforces and cultures is a challenge. Simply putting two separate organizations together necessarily creates disruptions and conflicts that can undermine both operations.

IT Audit and Governance from in


Telegram IT Audit and Governance
FROM USA