17 Risk Management & Privacy Flashcards
What are governance programs?
Sets of procedures and controls for effective organizational direction
Without governance, large organizations face chaos as employees would independently determine priorities and functions.
Why is corporate governance important in publicly traded companies?
Ensures appropriate strategic direction, plan development, and execution
It addresses the challenges of numerous or unengaged owners who cannot oversee daily operations.
What is the role of the board of directors in corporate governance?
Directs actions of the corporation on behalf of shareholders
The board has ultimate authority and is elected by shareholders during regular meetings.
What is considered best practice regarding board membership?
Majority of board members should be independent directors
Independent directors have no significant relationship with the company other than board membership.
How often do boards typically meet?
Monthly or quarterly
This infrequency necessitates delegation of day-to-day operations to a CEO.
Who does the board of directors hire to manage company operations?
Chief Executive Officer (CEO)
The CEO is responsible for the daily operations and reports to the board.
In what manner does governance cascade within an organization?
From shareholders to board of directors to CEO to other executives
Each level delegates authority downwards, maintaining a manageable hierarchy.
What is the difference in governance models between nonprofit and publicly traded organizations?
Nonprofit boards are elected by members or self-perpetuating
Privately owned organizations may have varied governance models based on ownership.
What is a governance, risk, and compliance (GRC) program?
Integration of governance, risk management, and compliance tasks
This program facilitates effective governance by addressing risk and compliance.
What is information security governance?
Extension of corporate governance focusing on information security
It ensures alignment of information security with organizational goals.
Who is typically responsible for information security within an organization?
Chief Information Security Officer (CISO)
The CISO is delegated authority from the CEO for information security matters.
What does an information security governance framework include?
Management structure for cybersecurity and enforcement mechanisms
It aligns with broader management approaches and includes policies for the organization.
What are the two major categories of governance structures?
Centralized and decentralized governance models
Centralized models enforce policies from a top-down approach, while decentralized models allow individual units to achieve objectives independently.
What is a centralized governance model?
Top-down approach with central authority creating and enforcing policies
This model ensures uniformity in policy application across the organization.
What is a decentralized governance model?
Bottom-up approach where individual units achieve cybersecurity objectives independently
This model allows flexibility and adaptation to specific unit needs.
What role do regulatory agencies play in governance?
They may regulate organizations, such as banks
For instance, banks are regulated by the U.S. Treasury Department or similar agencies.
What are the four types of documents included in an organization’s information security policy framework?
- Policies
- Standards
- Procedures
- Guidelines
What is the primary purpose of policies in an information security framework?
High-level statements of management intent that are mandatory for compliance
True or False: Compliance with guidelines is mandatory.
False
What should organizations consider when preparing their policy documents?
- Regulatory and legal requirements
- Industry-specific considerations
- Jurisdiction-specific considerations
What does an information security policy typically include?
- Importance of cybersecurity
- Requirements for staff and contractors
- Ownership of information
- Designation of the CISO
- Delegation of authority
Fill in the blank: Standards provide mandatory requirements describing how an organization will carry out its _______.
[information security policies]
What are the four types of standards organizations should pay attention to?
- Password standards
- Access control standards
- Physical security standards
- Encryption standards
What is the role of procedures in the information security policy framework?
Detailed, step-by-step processes that are mandatory for compliance