Sitemap
The CISO Den

The CISO Den is about how to deliver the best cybersecurity for organizations, no matter the size, budget, industry or country

A Journey to the Highest Cybersecurity Maturity: Compliance, Part 8

Compliance Management

1 min readJul 16, 2024

--

Press enter or click to view image in full size
Photo by Anne Nygård on Unsplash

Previously in this series:

About Compliance Management

The inputs of this cycle are:

  • Certification Report (for the last period)
  • Audit Report (for the last period)
  • List of Requirements from Best Practices and Standards (for the last period)
  • List of Requirements from Laws and Regulations (for the last period)
  • Information Security Meeting Minutes (with investigation of reports and agreed actions) (for the last period)

The outputs of this cycle are:

  • Certification Report (for the last period)
  • Audit Report (for the last period)
  • List of Requirements from Best Practices and Standards (for the last period)
  • List of Requirements from Laws and Regulations (for the last period)

--

--

The CISO Den
The CISO Den

Published in The CISO Den

The CISO Den is about how to deliver the best cybersecurity for organizations, no matter the size, budget, industry or country

Vicente Aceituno Canal
Vicente Aceituno Canal

Written by Vicente Aceituno Canal

Evidence-based cybersecurity management leader

No responses yet