#CISOaaS
17. The safety of the Third Parties and the safety of the company.
By Roberto Perelli | |
Companies entrust the protection of information about their customers, reputation, finances and their business continuity to partners and suppliers, or to Third Parties.
16. Security Services and Products, which ones to choose
By Roberto Perelli | |
It is known that Information Security is made by PEOPLE, PROCESSES and TECHNOLOGY, exactly in this order, because PEOPLE and PROCESSES determine the necessary technological solutions.
15. Internet security awareness and training
By Roberto Perelli | |
Internet security awareness or Cyber security awareness means "awareness of information security or cyber" or the knowledge and behavior of the people of an organization towards the protection of the physical and above all information assets of that organization.
14. Identity and access management.
By Roberto Perelli | |
Absolute Information Security would be obtained by isolating them from any access: in this way, however, they would not be useful to anyone.
13. The classification of information
By Roberto Perelli | |
The reason for the existence of the Information Security Program is to secure Company Information, but to protect something you need to know that it exists and what it is.
12. Security Policy (Regulations), Standards and Procedures.
By Roberto Perelli | |
Policies, Procedures and Standards are essential elements of the Safety Program but, in order to be useful, they must be perfectly in line with the reality and needs of the Company for this reason they are almost always the priority activities of the Fractional CISO in the Company.
11. Disaster Recovery.
By Roberto Perelli | |
Objective: To survive, work and recover from major and minor disasters affecting departments and interactions with other parts of the Company.
10. BACKUP, it seems easy ...
By Roberto Perelli | |
Having backups that are truly reliable and adapted to the needs is essential for the security of the Company's information.