Cyber IT Supervisory Forum eBook

Expanded Topic

New Topic

Version 2.0: Scope Expansion

• Technology governance • Control testing and evaluation • Exception management • Acceptable use policy & related policies and end-user agreements • Quality management program and continuous improvement • Technology architecture • Technology operations, problem management, and IT service and support • Project management • Asset lifecycle management

• Unsupported systems • Shadow IT management

• Data governance and management • Asset ownership and custodianship • Skill and resource assessment • Cloud services access and authorization • Procurement planning • Network device/firewall rule review • Email verification mechanisms • Encryption standards & key management

• Time services • Secure SDLC • End-user computing management • Applications management • Emergency changes • Insider threat management • Operational Technologies (OT) and Internet of Things (IoT) • Remote access devices (end points, mobile, virtual)

• Social media/dark web monitoring • Deception techniques (honeypots) • Forensic investigations • Returning systems to service • Business Impact Analyses

Includes Updated & New Mappings

Made with FlippingBook Digital Publishing Software