{tableName=glossary, name=Cybersecurity Asset Management (CSAM), description=
Cybersecurity Asset Management (CSAM) is a process of managing the security of digital assets and information systems. It involves the identification, classification, monitoring, and protection of digital assets and information systems from unauthorized access, use, modification, or destruction. CSAM is a critical component of an organization's overall security strategy, as it helps to ensure the confidentiality, integrity, and availability of digital assets. CSAM involves the implementation of policies and procedures that define the roles and responsibilities of personnel, as well as the implementation of technical controls to protect digital assets. CSAM also involves the use of technologies such as firewalls, intrusion detection systems, and encryption to protect digital assets from unauthorized access, use, or modification. Additionally, CSAM involves the implementation of processes and procedures to monitor the security of digital assets, including the identification of threats, assessment of risks, and implementation of countermeasures., topic=null, hs_path=cybersecurity-asset-management-csam}--
{tableName=glossary, name=ISO/IEC 27002 Framework, description=
ISO/IEC 27002 is an international standard that provides guidelines for the implementation of an information security management system (ISMS). It is part of a larger set of standards known as the ISO/IEC 27000 series, which provides a comprehensive framework for organizations to manage their information security. The ISO/IEC 27002 framework outlines a set of security controls and best practices that organizations can use to protect their information assets. These controls include physical security, access control, system security, network security, and data security. The framework also provides guidance on how to develop and implement an effective ISMS. The standard is designed to help organizations ensure the confidentiality, integrity, and availability of their information assets, and to comply with applicable laws and regulations., topic=null, hs_path=iso-iec-27002-framework}--
{tableName=glossary, name=ISO/IEC 27002 Scope, description=
ISO/IEC 27002 Scope is the scope of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27002 standard. This standard provides guidance on the selection, implementation, and management of information security controls to protect and secure information assets. The scope of ISO/IEC 27002 covers the management of information security in organizations, including the selection, implementation, and management of information security controls. It is intended to cover all areas of information security, including physical security, personnel security, access control, network security, system security, application security, and data security. The scope of ISO/IEC 27002 is not limited to any particular industry or sector, but is applicable to any organization that stores, processes, transmits, or uses information assets. The scope of ISO/IEC 27002 is also applicable to any organization that is responsible for the security of its own information assets, as well as those of its customers, suppliers, and other stakeholders., topic=null, hs_path=iso-iec-27002-scope}--
{tableName=glossary, name=Risk Identification (Ri), description=
Risk Identification (Ri) is the process of identifying and understanding potential risks that may affect an organization, project, or process. This process typically involves the identification of both internal and external factors that may have an impact on the organization, project, or process. Risk identification involves analyzing the environment and the organization's activities to identify potential risks. It also involves the analysis of internal and external data to identify potential risks. The process includes the identification of the sources of risk, the assessment of the probability of occurrence, and the evaluation of the consequences of the risk. The purpose of risk identification is to identify and prioritize risks that need to be addressed, so that the organization can manage them effectively., topic=null, hs_path=risk-identification-ri}--
{tableName=glossary, name=ISO/IEC Data Center, description=
ISO/IEC Data Center is a facility that houses computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g. air conditioning, fire suppression) and various security devices. The main purpose of a data center is to process, store, and distribute large amounts of data. Data centers are typically used by large organizations and businesses to store and process their data, including financial records, customer data, and other confidential information. ISO/IEC Data Centers are designed to adhere to the ISO/IEC standards for data center design, operation, and management. These standards provide guidelines for data center design, operation, and management that ensure the highest levels of reliability, availability, security, and performance. These standards also provide guidance on how to minimize the risk of data loss or corruption, and how to efficiently and securely manage and store data., topic=null, hs_path=iso-iec-data-center}--
{tableName=glossary, name=Business Continuity Management (BCM), description=
Business Continuity Management (BCM) is a holistic management process that identifies potential threats to an organization and the impacts to business operations that those threats may have, and which provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand, and value-creating activities. It includes the development of policies and procedures for preventing, responding to, and recovering from disruptive events. BCM also includes the identification of an organization’s critical business functions, the development of recovery strategies, the implementation of plans and procedures, the testing of plans and procedures, and the maintenance of plans and procedures. BCM helps organizations to protect their operations, financials, customers, and stakeholders in the event of a disruption. It also helps organizations to maintain their competitive edge by ensuring the continuity of their operations, products and services in the face of any disruption., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name='
Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value=
This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=business-continuity-management-bcm}--
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75