Page de couverture de Cybersecurity Program Best Practices

Cybersecurity Program Best Practices

Aperçu

Essayer pour 0,00 $
Choisissez 1 livre audio par mois dans notre incomparable catalogue.
Écoutez à volonté des milliers de livres audio, de livres originaux et de balados.
L'abonnement Premium Plus se renouvelle automatiquement au tarif de 14,95 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Cybersecurity Program Best Practices

Auteur(s): United States Department of Labor
Narrateur(s): Tom Brooks
Essayer pour 0,00 $

14,95$ par mois après 30 jours. Annulable en tout temps.

Acheter pour 8,71 $

Acheter pour 8,71 $

Confirmer l'achat
Payer avec la carte finissant par
En confirmant votre achat, vous acceptez les conditions d'utilisation d'Audible et la déclaration de confidentialité d'Amazon. Des taxes peuvent s'appliquer.
Annuler

À propos de cet audio

Cybersecurity Program Best Practices

ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks.

The Employee Benefits Security Administration has prepared the following best practices for use by recordkeepers and other service providers responsible for plan-related IT systems and data, and for plan fiduciaries making prudent decisions on the service providers they should hire. Plans’ service providers should:

  1. Have a formal, well-documented cybersecurity program.
  2. Conduct prudent annual risk assessments.
  3. Have a reliable, annual third-party audit of security controls.
  4. Clearly define and assign information security roles and responsibilities.
  5. Have strong access control procedures.
  6. Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments.
  7. Conduct periodic cybersecurity awareness training.
  8. Implement and manage a secure system development life-cycle (SDLC) program.
  9. Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response.
  10. Encrypt sensitive data, stored and in transit.
  11. Implement strong technical controls in accordance with best security practices.
  12. Appropriately respond to any past cybersecurity incidents.
©2021 Tom Brooks (P)2021 Tom Brooks
Sécurité et chiffrement Sécurité informatique Piratage Entreprise
activate_Holiday_promo_in_buybox_DT_T2

Ce que les auditeurs disent de Cybersecurity Program Best Practices

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.