An effective Governance, Risk and Compliance program delivers sustainability, consistency, efficiency and transparency against cyber threats.rn In response to the headline breaches plaguing organizations across the globe, there have been numerous solutions and recommendations that have gained popularity in the fight to combat cyber-crime. New security appliances, 24×7 network monitoring services and red team assessments are a few of the solutions being discussed among IT leadership and the cybersecurity services community. While each of these solutions plays a crucial role in strengthening the cyber resilience of organizations, their efforts are often futile if the appliances are not being used correctly or if vulnerabilities are not remediated properly and expeditiously. So, the question becomes, how do you manage your security program and ensure that your organization is following the proper processes, policies and procedures? The best way to do this is with an effective, cyber-centric IT Governance, Risk and Compliance (GRC) program. Unless I’m talking with internal audit leaders, I’m often asked “What is IT GRC?” A closer look quickly reveals that the concepts covered by this acronym encompass topics that keep CIOs and CISOs awake at night — at organizations of all sizes, in all sectors. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe An effective IT GRC program delivers sustainability, consistency, efficiency and transparency through execution in strategic alignment, value delivery, risk management, resource management and performance management. Each of these domains are vital to the success of an enterprise’s IT effectiveness, however in today’s cyber threat landscape, it is imperative that an organization’s Risk Management Program sufficiently addresses modern cyber risks. An effective Cyber Risk Management Program is an organization’s first defense from becoming the next headline breach. An IT audit or security assessment only delivers value if proper remediation steps are taken and supported by the board and senior management. An effective cyber-centric IT GRC program can facilitate the remediation and prevent future weaknesses. Here are ten questions to consider which an IT GRC program will facilitate: What are our objectives related to the confidentiality, integrity and availability or our systems and data? How do we establish, maintain and approve cybersecurity objectives that support achievement of the organization’s business objectives? How do we establish, maintain and communicate integrity and ethical values to support the Cybersecurity Risk Management Program? How is the board of directors engaged in the oversight of the organization’s Cyber Risk Management Program? Have we established effective cybersecurity accountability and reporting lines? What are our cyber risks based on the nature of our business operations, our principal products and services, and our distribution channels? What types of sensitive information do we create, collect, transmit, use or store? Where is our sensitive information stored? What factors have a significant effect on our inherent cybersecurity risks, including the characteristics of technologies implemented, use of third-party service providers, and delivery channels used by the organization; organizational and user characteristics; and environmental, technological, organizational and other significant changes? How do we conduct ongoing and periodic evaluations of the operating effectiveness of cybersecurity control activities? How do we evaluate and communicate cybersecurity threats, vulnerabilities and corrective measures to management and the board of directors? While an effective, cyber-centric IT GRC program will not prevent all cyber incidents, incorporating these 10 areas will better position your organization – away from being the “gazelle at the back of the herd,” in constant attack from cyber criminals. Related content brandpost Modern Cyberattacks: Tradecraft on Your Network Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn By Wesley McGrew Jul 27, 2017 3 mins Security brandpost Being a Compliant Victim of Cybercrime Security must extend beyond mere compliance to protect the entirety of your business. Weu2019re talking about offense-oriented testing of your whole network. rn By Wesley McGrew Jul 27, 2017 2 mins Security brandpost Cybersecurity Spending: Are You Patching Holes or Checking Boxes? Cybersecurity spending is a complex question that really comes down to your needs. There is always a vendor waiting in the wings to sell you anything, so ask these key questions before you make any investment. rn By Brad Fuller, Director of Operations Jul 20, 2017 4 mins Security brandpost Their Breach is Your Breach As password policies become ever-stronger, users have a more difficult time committing them to memory. The most popular workaround is password reuse, a technique that hackers can leverage to breach your systems and servicesu2014as easily as those you By Wesley McGrew Jul 18, 2017 3 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe