GOVERNANCE - Risk Management Roles and responsibilites - Information Security Roles and Responsibilities
35 important questions on GOVERNANCE - Risk Management Roles and responsibilites - Information Security Roles and Responsibilities
What should drive projects
Which six elements are normally included in a feasibility study?
- Project Scope
- Current analysis
- Requirements
- Approach
- Evaluation
- Review
Who conducts the review of a feasibility study?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What is the main question in a business case for setting up and continuing a project?
What is meant by "stage gates" or "kill points" in a project?
What is an essential monitoring tool to track the status of the security program and issues like compliance and emerging risk?
What is important to make senior management aware of the state of the information security program and governance issues?
What groups need to bee informed by routine communication channels?
- Senior management
- Business process owners
- Other management
- Employees
Who needs to establish acceptance and risk tolerance?
Who needs to ensure adequate regulatory compliance?
Who requires reporting of security effectiveness?
Who oversees a policy of knowledge management and resource utilization?
Who oversees a policy of assurance process integration?
What role requires monitoring and metrics for security activities
What role ensures processes for knowledge capture and efficiency metrics?
What role provides oversight of all assurance functions and plans for integration
What role identifies emerging risk, promotes business unit security practices and identifies compliance issues?
What role reviews and advises on cost effectiveness of security activities needed to serve business functions?
What role reviews processes for knowledge capture and dissemination and utilization of resources?
What role identifies critical business processes and assurance providers?
What role provides direct assurance integration efforts?
What role develops the security strategy in alignment with business objectives?
What role oversees the security program and liaises with business process owners for ongoing alignment?
What role monitors and optimizes utilization, efficiency and effectiveness of security resources?
What role develops risk mitigation strategies?
What role enforces policy and regulatory compliance
What role develops, implements and reports monitoring metrics needed to support at the strategic, management and operational levels?
What role develops methods for knowledge capture and dissemination?
What role monitors and measures resource utilization and cost effectiveness?
What role ensures that gaps and overlaps are identified and addressed
What role promotes integration of assurance activities?
What role evaluates and reports on corporate risk management practices and results?
What role evaluates and reports on the comprehensives and effectiveness of program monitoring activities
What role evaluates and reports on the efficiency and utilization of resources?
What role evaluates and reports on integration and effectiveness of assurance processes?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding