Access Millions of academic & study documents

Sample ld7009 assignment 90

Content type
User Generated
Showing Page:
1/55
Information Assurance and Risk Management
White Paper
A Critical Analysis Report
In this white paper the author draws attention of the executive to the personal and organisational
risks they face, how information assurance and risk management best practices can guard against
ever-increasing cyber security threats, and how Cerious Cybernetics Corp can create opportunities
with customers and suppliers who value independent reassurance.
Page 1

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/55
Contents
Introduction ........................................................................................................................................... 3
Executive Summary ................................................................................................................................ 4
News Headlines ...................................................................................................................................... 5
Challenges for CCC ................................................................................................................................. 5
Using Standards ..................................................................................................................................... 6
Selecting Standards ................................................................................................................................ 7
Implementing Standards Frameworks ................................................................................................... 8
Risk Management .................................................................................................................................. 9
Assessing Risk .................................................................................................................................... 10
Current Risks, Vulnerabilities, Threats, and Hazards ........................................................................ 10
Risk Management in Action An Example ....................................................................................... 11
Assurance and Certification .............................................................................................................. 11
Organisational Structure Considerations .............................................................................................. 12
Ransomware and Service Improvement Plan (SIP) ............................................................................... 12
Future Risk and Assurance Challenges.................................................................................................. 15
Summary ............................................................................................................................................... 15
Acronyms and Abbreviations ................................................................................................................ 16
References ............................................................................................................................................ 16
Resources .............................................................................................................................................. 21
Appendix A Assumptions ...................................................................................................................... 22
Appendix B Legislation, Regulation, Contractual .................................................................................. 23
Appendix C Policies ............................................................................................................................... 27
Appendix D Assets ................................................................................................................................. 33
Appendix E Statement of Applicability ................................................................................................. 34
Appendix F Supporting Standards ......................................................................................................... 41
Appendix G ISO27k_ISMS_implementation_and_certification_process_v4.pdf ................................. 44
Appendix H Common Threats and Hazards .......................................................................................... 45
Appendix I Mapping ISO to NIST ........................................................................................................... 48
Appendix J Future Risks ........................................................................................................................ 49
Appendix K Organisational Structure .................................................................................................... 53
Page 2

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/55

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 55 pages?
Access Now
Unformatted Attachment Preview
Information Assurance and Risk Management White Paper A Critical Analysis Report In this white paper the author draws attention of the executive to the personal and organisational risks they face, how information assurance and risk management best practices can guard against ever-increasing cyber security threats, and how Cerious Cybernetics Corp can create opportunities with customers and suppliers who value independent reassurance. Page 1 Contents Introduction ........................................................................................................................................... 3 Executive Summary................................................................................................................................ 4 News Headlines...................................................................................................................................... 5 Challenges for CCC ................................................................................................................................. 5 Using Standards ..................................................................................................................................... 6 Selecting Standards ................................................................................................................................ 7 Implementing Standards Frameworks ................................................................................................... ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents