Requirement

Cyber security management

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

This requirement is part of the framework:  

Other requirements of the framework

No items found.
0
Cyber security management
No items found.
Risk management and leadership
Best practices
How to implement:
Cyber security management

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

Read below what concrete actions you can take to improve this ->

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
Cyber security management
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Creation and maintenance of the information security plan report
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creation and maintenance of the information security plan report

This task helps you comply with the following requirements

Creating and maintaining a statement of applicability
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Creating and maintaining a statement of applicability

This task helps you comply with the following requirements

Defining the frameworks that serve as the basis of the management system
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Defining the frameworks that serve as the basis of the management system

This task helps you comply with the following requirements

Appointment of a Chief Information Security Officer (Greece)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Appointment of a Chief Information Security Officer (Greece)

This task helps you comply with the following requirements

No items found.
Review reporting of simplified ICT risk management framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Review reporting of simplified ICT risk management framework

This task helps you comply with the following requirements

ICT project management procedure
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

ICT project management procedure

This task helps you comply with the following requirements

Auditing of risk management framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Auditing of risk management framework

This task helps you comply with the following requirements

Creation and maintenance of governance and control framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creation and maintenance of governance and control framework

This task helps you comply with the following requirements

Notification of a significant incident with cross-border and cross-sectoral impact
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Notification of a significant incident with cross-border and cross-sectoral impact

This task helps you comply with the following requirements

Conducting an external audit
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Conducting an external audit

This task helps you comply with the following requirements

Notifying the administrative body of incidents
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Notifying the administrative body of incidents

This task helps you comply with the following requirements

No items found.
Appointment of a Cyber Security Officer (Lithuania)
Critical
High
Normal
Low
Appointment of a Chief Information Security Officer (Lithuania)
Critical
High
Normal
Low
Cybersecurity auditing (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Cybersecurity auditing (Lithuania)

This task helps you comply with the following requirements

Technical cyber security measures (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Technical cyber security measures (Lithuania)

This task helps you comply with the following requirements

Usage of data centers (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Usage of data centers (Lithuania)

This task helps you comply with the following requirements

Usage of the Secure Network (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Usage of the Secure Network (Lithuania)

This task helps you comply with the following requirements

Cyber Security Information System usage (Lithuania)
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Cyber Security Information System usage (Lithuania)

This task helps you comply with the following requirements

Providing the security managers information to a competent authority
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Providing the security managers information to a competent authority

This task helps you comply with the following requirements

Appointment, tasks and position of a Cyber security manager
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Appointment, tasks and position of a Cyber security manager

This task helps you comply with the following requirements

Assessment of conformity (Belgium)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Assessment of conformity (Belgium)

This task helps you comply with the following requirements

Documentation of organization's dependencies on external resources
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Documentation of organization's dependencies on external resources

This task helps you comply with the following requirements

Strategic directions of risk response options
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Strategic directions of risk response options

This task helps you comply with the following requirements

Identify the organisation's strategy and priorities
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Identify the organisation's strategy and priorities

This task helps you comply with the following requirements

Recognizing and listing sensitive work fields and jobs
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Recognizing and listing sensitive work fields and jobs

This task helps you comply with the following requirements

Description of cyber security structure
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Description of cyber security structure

This task helps you comply with the following requirements

Monitoring and analysing effectiveness of digital operational resilience strategy
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Monitoring and analysing effectiveness of digital operational resilience strategy

This task helps you comply with the following requirements

Learning from testing operational resilience
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Learning from testing operational resilience

This task helps you comply with the following requirements

Adequate security principles of the organisation in terms of classified information
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Adequate security principles of the organisation in terms of classified information

This task helps you comply with the following requirements

Archiving and retaining outdated security documentation
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Archiving and retaining outdated security documentation

This task helps you comply with the following requirements

Security roles, responsibilities, and objectives derived from the organization's goals
Critical
High
Normal
Low
Kasautumisvaikutuksen huomiointi suojattavien kohteiden luokittelussa
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Kasautumisvaikutuksen huomiointi suojattavien kohteiden luokittelussa

This task helps you comply with the following requirements

Identifying and documenting dependencies between assets
Critical
High
Normal
Low
4
requirements
Risk management and leadership
Cyber security management

Identifying and documenting dependencies between assets

This task helps you comply with the following requirements

Muiden tietoturvavaatimusten seuranta
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Muiden tietoturvavaatimusten seuranta

This task helps you comply with the following requirements

Tietoturvallisuuteen liittyvän dokumentaation ajantasaisuus
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Tietoturvallisuuteen liittyvän dokumentaation ajantasaisuus

This task helps you comply with the following requirements

Luettelo turvaluokiteltuja asiakirjoja käsittelevistä henkilöistä valtionhallinnossa
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Luettelo turvaluokiteltuja asiakirjoja käsittelevistä henkilöistä valtionhallinnossa

This task helps you comply with the following requirements

Varautumista ohjaavan lainsäädännön tunnistaminen ja dokumentointi
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Varautumista ohjaavan lainsäädännön tunnistaminen ja dokumentointi

This task helps you comply with the following requirements

Determination and adequacy of the cyber security budget
Critical
High
Normal
Low
7
requirements
Risk management and leadership
Cyber security management

Determination and adequacy of the cyber security budget

This task helps you comply with the following requirements

Preparation for information campaign against the organization
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Preparation for information campaign against the organization

This task helps you comply with the following requirements

Supervision carried out by the board of the organization
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Supervision carried out by the board of the organization

This task helps you comply with the following requirements

Data collection and processing
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Data collection and processing

This task helps you comply with the following requirements

Defining the units of your organization
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Defining the units of your organization

This task helps you comply with the following requirements

Consideration of external goals when setting information security objectives
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Consideration of external goals when setting information security objectives

This task helps you comply with the following requirements

Recognizing the technology needed to accomplish the cybersecurity goals
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Recognizing the technology needed to accomplish the cybersecurity goals

This task helps you comply with the following requirements

Strategy for cyber security program
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Strategy for cyber security program

This task helps you comply with the following requirements

Establishing and maintaining a cyber security program
Critical
High
Normal
Low
requirements
Risk management and leadership
Cyber security management

Establishing and maintaining a cyber security program

This task helps you comply with the following requirements

Ensuring record integrity related to security requirements
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Ensuring record integrity related to security requirements

This task helps you comply with the following requirements

Procedure for classification of projects
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Procedure for classification of projects

This task helps you comply with the following requirements

Evaluating the efficiency of internal audits
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Evaluating the efficiency of internal audits

This task helps you comply with the following requirements

Considering the possibility of fraud in risk assessment
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Considering the possibility of fraud in risk assessment

This task helps you comply with the following requirements

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
Cyber security management
of the framework  
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

The ISMS component hierachy

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.