SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
SECURITY SELF
ASSESMENT
qUESTIONNAIRE
The following section presents a simple checklist
as a tool for top management to help guide their
internal review of their company’s cyber resilience
capabilities and to enable them to ask the right
questions to the teams involved in these initiatives.
The questions asked in the tool can help them
to identify speciic strengths and weaknesses –
and paths to improvement within their respective
company.

For each of the questions below, companies should
choose from the provided options the one that is
best relecting the current practices of the company.
Each of the options has been given a bullet colour,
where:
■ This is the least desirable response; Improvement
should clearly be considered.
■ Additional improvement is possible to better
protect the company.

At the same time, this self assessment questionnaire
can be used as a checklist by companies that are
just beginning in their information security initiatives,
and want to use the questions and answers as a
basis for planning their cyber resilience capabilities.

■ This answer is the best relection of resilience
against cyber threats.
Further, the presence of a more specific checklist
under each question will help you to identify and
document the status of a set of basic information
security controls for your company.
Companies can use the referenced principles and
actions in the two previous chapters as guidance
for improving their resilience related to each of the
speciic questions.

1

BELGIAN CYBER SECURITY GUIDE |

35
1. DO YOU EVALUATE HOW SENSITIVE
INFORMATION IS WITHIN YOUR COMPANY?

✘


No, but we have a irewall to protect us from theft of information.

Yes, we understand the importance of our information and implement general security measures.

and we have an information classiication model and know where our sensitive information
✔ Yes, processed. We implement security measures based on the sensitivity of the information. is stored
and

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Are your sensitive data identiied and classiied?
Are you aware of your responsibility regarding the identiied sensitive data?
Are the most sensitive data highly protected or encrypted?
Is the management of personal private information covered by procedures?
Are all employees able to identify and correctly protect sensitive and non sensitive data?

LINK TO RELEVANT
PRINCIPLE

36

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

2

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

2. DO YOU PERFORM INFORMATION
SECURITY RELATED RISk ASSESSMENTS ?

✘



We do not perform risk assessments.

We perform risk assessments but not on any speciic information security related topics

✔ We perform risk assessments on speciic information security topics

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Do you address vulnerability results in order of high risk to low risk?
Are events that could cause interruptions to business processes identiied and is the
impact of the potential related interruptions assessed?
Do you have a current business continuity plan that is tested and updated on a regular
basis?
Do you regularly perform a risk assessment to update the level of protection the data and
information need?
Are areas of risk identiied throughout your business processes in order to prevent
information processing corruption or deliberate misuse?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

3

BELGIAN CYBER SECURITY GUIDE |

37
3. AT WHAT LEVEL IS INFORMATION
SECURITY GOVERNANCE IMPLEMENTED?

✘



There is no information security governance in place.

Information security governance is installed within the ICT department since that’s where the information
needs to be secured.

✔ Information security governance is installed at the corporate level to ensure an impact on the entire
company.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Do board members allocate an information security budget?
Is information security part the existing risk management of the directors?
Does top management approve the information security policy of the company and
communicate it by an appropriate way to the employees?
Are board members and top management informed on a regular basis of the latest
developments in information security policies, standards, procedures and guidelines?
Is there at least one oficer part of the management structure in charge of the protection of
data and the privacy of personal information?

LINK TO RELEVANT
PRINCIPLE

38

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

4

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

4. DO YOU HAVE AN INFORMATION SECURITY TEAM
OR A DEDICATED INFORMATION
SECURITY FUNCTION WITHIN YOUR COMPANY?

✘


We do not have an information security team or speciic roles & responsibilities
concerning information security.
We do not have an information security team but we have deined
speciic information security roles & responsibilities within the company.

✔ We have an information security team or a dedicated information security function.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Does an identiied information security specialist or team coordinate in house knowledge
and provide help to the management in decision making?
Is the identiied information security specialist or team responsible to review and
systematically update the information security policy based on signiicant changes or
incidents?
Has the identiied information security specialist or team enough visibility and support to
intervene in any information-related initiative in the company?
Are there different managers responsible for separate types of data?
Is the information security policy feasibility and effectiveness, as well as the information
security team’s eficacy, regularly reviewed by an independent body?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

5

BELGIAN CYBER SECURITY GUIDE |

39
5. HOW DOES YOUR COMPANY DEAL WITH
INFORMATION SECURITY RISkS FROM SUPPLIERS
WHO CAN ACCESS YOUR SENSITIVE INFORMATION?

✘


We have a relationship based on mutual trust with our suppliers.

For some contracts we include information security related clauses.

processes in place to
for
✔ We havesecurity guidelines are validate access andsuppliersbyand suppliers.
speciic
communicated
signed
our

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Are contractors and suppliers identiied by an ID badge with a recent picture?
Do you have policies addressing background checks for contractors and suppliers?
Is access to facilities and information systems automatically cut off when a contractor or
supplier ends his mission?
Do suppliers know how and to whom to immediately report in your company any loss or
theft of information?
Does your company ensure suppliers keep their software and applications updated with
security patches?

LINK TO RELEVANT
PRINCIPLE

40

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

6

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

6. DOES YOUR COMPANY EVALUATE COMPUTER AND
NETWORk SECURITY ON A REGULAR BASIS?

✘



We do not perform audits or penetration tests to evaluate our computer and network security.

We do not have a systematic approach for performing security audits and/or penetration tests
but execute some on an ad hoc basis.

✔ Regular security audits and/or penetration tests are systematically part of our approach to evaluate
our computer and network security.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Do you test on a regular basis and keep records of identiied threats?
Do you have procedures in order to evaluate human threats to your information systems,
including dishonesty, social engineering and abuse of trust?
Does your company request security audit reports from its information service providers?
Is the utility of each type of stored data also assessed during the security audits?
Do you audit your information processes and procedures for compliance with the other
established policies and standards within the company?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

7

BELGIAN CYBER SECURITY GUIDE |

41
7. WHEN INTRODUCING NEW TECHNOLOGIES,
DOES YOUR COMPANY ASSESS POTENTIAL
INFORMATION SECURITY RISkS?

✘


Information security is not part of the process for implementing new technologies.

Information security is only implemented in the process for new technologies on an ad hoc basis.

✔ Information security is included in the process for implementing new technologies.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
When considering implementing new technologies, do you assess their potential impact
on the established information security policy?
Are there protective measures to reduce risk when implementing new technologies?
Are the processes to implement new technologies documented?
When implementing new technologies, could your company rely on partnerships, in order
that collaborative efforts and critical security information sharing is occurring?
Is your company’s information security policy often considered as a barrier to
technological opportunities?

LINK TO RELEVANT
PRINCIPLE

42

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

8

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

8. DOES INFORMATION SECURITY TAkE PLACE WITHIN
YOUR COMPANY?

✘


We put trust in our employees and do not consider information security guidance as added value.

Only our ICT personnel receives speciic training for securing our ICT-environment.

✔ Regular information security awareness sessions are organised for all employees.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Are some information security awareness sessions adapted to the activity ield of the
employees?
Are employee taught to be alert to information security breaches?
Does your company have a guideline for users to report security weakness in, or threats
to, systems or services?
Do employees know how to properly manage credit card data and private personal
information?
Do third party users (where relevant) also receive appropriate information security training
and regular updates in organisational policies and procedures?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

9

BELGIAN CYBER SECURITY GUIDE |

43
9. HOW DO YOU USE PASSWORDS WITHIN THE
COMPANY?
share passwords with other
and/or no
✘ Wepasswords nor for the regularcolleagues passwords.policy exists for the safe usage
of
change of
have unique
 All employees, including the management, mandatory. passwords but complexity rules are not enforced.
Changing passwords are optional, but not
including the management, have
✔ All employees,and must be changed regularly. a personal password that must meet deined password
requirements

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Did your company establish and enforce a globally-accepted password policy?
Can you assure all passwords in your company are not stored into easily accessible iles,
bad or blank, default, rarely changed even on mobile devices?
Do you feel well protected against unauthorized physical access to system?
Are users and contractors aware of their responsibility to protect unattended equipments
as well (logoff)?
Have employees been taught how to recognise social engineering and react to this threat?

LINK TO RELEVANT
PRINCIPLE

44

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

10

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

10. IS THERE A COMPANY POLICY IN PLACE FOR THE
APPROPRIATE USE OF THE INTERNET AND SOCIAL
MEDIA?

✘



No, there is no policy in place for the appropriate use of the internet.

Yes, a policy is available on a centralised location accessible to all employees
but has not been signed by the employees.

policy for
✔ Yes, asigned the the appropriate use of the internet is part of the contract / all employees
have
policy.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Are there general communication guidelines and processes for employees in the company,
including relation to the press and social media?
Is there a disciplinary process for employees violating the company’s communication
guidelines?
Does an identiied communications responsible or team screen the Internet in order to
assess e-reputation risks and status?
Has your company assessed its liability for acts of employees or other internal users or
attackers abusing the system to perpetrate unlawful acts?
Has your company taken measures to prevent an employee or other internal user to attack
other sites?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

11

BELGIAN CYBER SECURITY GUIDE |

45
11. DOES YOUR COMPANY MEASURE, REPORT AND
FOLLOW-UP ON INFORMATION SECURITY RELATED
MATTERS?

✘



We do not monitor, report or follow-up on the eficiency and adequacy of our implemented security
measures.
Our company has implemented tools and methods to monitor, report and follow-up the eficiency and
adequacy of a selection of our implemented security measures.

company has implemented the
✔ Ourthe eficiency and adequacy of allnecessary tools and methods to monitor, report and follow-up
on
our implemented security measures.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Are audit trails and logs relating to the incidents maintained and proactive action taken in
a way that the incident doesn’t reoccur?
Does your company verify compliance with regulatory and legal requirements (for
example: data privacy)?
Has your company developed some own tools to assist the management in assessing the
security posture and enabling the company to accelerate its ability to mitigate potential
risks?
Does an information security roadmap including goals, progress evaluation and potential
collaborative opportunities exist in your company?
Are monitoring reports and incidents reported to authorities and other interest groups
such as a sector federation?

LINK TO RELEVANT
PRINCIPLE

46

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

12

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

12. HOW ARE SYSTEMS kEPT UP-TO-DATE WITHIN
YOUR COMPANY ?

✘


We rely on automatic patch management, provided by the vendor, for most of our solutions.

Security patches are systematically applied on a monthly basis.

a vulnerability management
continuously seek information
✔ We have vulnerabilities (for ex. troughprocess in placeonandservice that automatically sendsconcerning
possible
a subscription
a
out warnings
for new vulnerabilities) and apply patched based on the risks they mitigate.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Is vulnerability scanning a regular scheduled maintenance task in the company?
Is application system reviewed and tested after change in operating system?
Can users check themselves the existence of unpatched applications?
Are users aware that they also have to keep up-to date the operating system and
applications, including security software, of their mobile devices?
Are users trained to recognize a legitimate warning message (requesting permission for
update, or from fake antivirus) and to properly notify the security team if something bad or
questionable has happened?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

13

BELGIAN CYBER SECURITY GUIDE |

47
13. ARE USER ACCESS RIGHTS TO APPLICATIONS
AND SYSTEMS REVIEWED AND MANAGED
ON A REGULAR BASIS?

✘


Access rights to applications and systems are not consistently removed nor reviewed.

Access rights to applications and systems are only removed when an employee is leaving the company.

control policy established with regular
✔ An accessapplications andissupporting systems. reviews of assigned user access rights for all relevant
business

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Is access to electronic information systems and facilities limited by policies and
procedures?
Does your company rely on a privacy policy stating the information it collects ( for
example about your customers: physical addresses, email addresses, browsing history,
etc), and is done with it
Do the policies and procedures specify methods used to control physical access to
secure areas such as door locks, access control systems or video monitoring?
Is access to facilities and information systems automatically cut off when members of
personnel end employment?
Is the sensitive data classiied (Highly Conidential, Sensitive, Internal Use Only,...) and its
granted users inventoried?

LINK TO RELEVANT
PRINCIPLE

48

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

14

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

14. IN YOUR COMPANY, CAN THE EMPLOYEES
USE THEIR OWN PERSONAL DEVICES, SUCH AS
MOBILE PHONES AND TABLETS, TO STORE OR
TRANSFER COMPANY INFORMATION?

✘



Yes, we can store or transfer company information on personal devices without the implementation of
extra security measures.
A policy exists that prohibits the use of personal devices to store or transfer company information but
technically it is possible to do so without implementing extra security measures.

can only store transfer company information after the implementation
✔ Personal devices personal deviceorand/or a professional solution has been provided. of security
measures on the

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Does your company rely on a well accepted Bring Your Own Device policy?
Are mobile devices protected from unauthorised users?
Are all devices and connections permanently identiied on the network?
Is encryption installed on each mobile device to protect the conidentiality and integrity of
data?
Is the corporate level aware that while the individual employee may be liable for a device,
the company is still liable for the data?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

15

BELGIAN CYBER SECURITY GUIDE |

49
15. HAS YOUR COMPANY TAkEN MEASURES
TO PREVENT LOSS OF STORED INFORMATION?

✘


We have no backup/availability process in place.

We have a backup/availability process but no restore tests have been performed.

process in place that
restore/resilience tests. We have
✔ We have a backup/availabilitysecured location or areincludesother high-availability solutions. copies of
our backup stored in another
using

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes
Are there enough members of the staff able to create retrievable backup and archival
copies?
Is the equipment protected from power failures by using permanence of power supplies
such as multiple feeds, uninterruptible power supply (ups), backup generator etc.?
Are the backup media regularly tested to ensure that they could be restored within the
time frame allotted in the recovery procedure?
Does your company apply reporting procedures for lost or stolen mobile equipment?
Are employees trained on what to do if information is accidentally deleted and how to
retrieve information in times of disaster?

LINK TO RELEVANT
PRINCIPLE

50

| BELGIAN CYBER SECURITY GUIDE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

16

No
SECURITY SELF ASSESSMENT
qUESTIONNAIRE

16. IS YOUR COMPANY PREPARED TO HANDLE
AN INFORMATION SECURITY INCIDENT?

✘



We won’t have any incidents. In case we have, our employees are competent enough to cope with it.

We have incident management procedures, however not adapted to handle information security
incidents.

to
information security incidents, with the necessary escalation and
✔ We have a dedicated process Wehandle to handle incidents as eficient and effective as possible so we
communication mechanisms.
strive
learn how to better protect ourselves in the future.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes

No

Does your process address different types of incidents ranging from denial of service to
breach of conidentiality etc., and ways to handle them?
Does your company have an incident management communication plan?
Do you know which authorities to notify and how in case of incident?
Does your company have contact information sorted and identiied for each type of
incident?
Do you rely on an Internal Communication responsible for contacts with employees and
their families?

LINK TO RELEVANT
PRINCIPLE

POTENTIAL ACTIONS
TO IMPROVE YOUR RESPONSE

17

BELGIAN CYBER SECURITY GUIDE |

51

Mais conteúdo relacionado

Mais procurados

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
CISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgCISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgIEVISION IT SERVICES Pvt. Ltd
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approachAbhishek Sood
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedIBM Security
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
2016_William_Gibson
2016_William_Gibson2016_William_Gibson
2016_William_GibsonBill Gibson
 

Mais procurados (20)

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
CISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgCISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.org
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
2016_William_Gibson
2016_William_Gibson2016_William_Gibson
2016_William_Gibson
 

Semelhante a Cybersecurity threat assessment manual

ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationIrmaBrkic1
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risksPrathitha cb
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and responseZyrellLalaguna
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCBIZ, Inc.
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lankaAnoosha Factocert
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Security Education Catalog
Security Education CatalogSecurity Education Catalog
Security Education Catalograzomatic
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentCigital
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfSALES97
 
Behavioral-Based Safety – Predictive Analytics and a Safe Workplace
Behavioral-Based Safety – Predictive Analytics and a Safe Workplace Behavioral-Based Safety – Predictive Analytics and a Safe Workplace
Behavioral-Based Safety – Predictive Analytics and a Safe Workplace McKenney's Inc
 
iPower Security Assessment
iPower Security AssessmentiPower Security Assessment
iPower Security Assessmentgoipower
 

Semelhante a Cybersecurity threat assessment manual (20)

ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risks
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Security Education Catalog
Security Education CatalogSecurity Education Catalog
Security Education Catalog
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
Behavioral-Based Safety – Predictive Analytics and a Safe Workplace
Behavioral-Based Safety – Predictive Analytics and a Safe Workplace Behavioral-Based Safety – Predictive Analytics and a Safe Workplace
Behavioral-Based Safety – Predictive Analytics and a Safe Workplace
 
iPower Security Assessment
iPower Security AssessmentiPower Security Assessment
iPower Security Assessment
 

Mais de Adeel Javaid

Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsAdeel Javaid
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computingAdeel Javaid
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networksAdeel Javaid
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in AcademiaAdeel Javaid
 
Secrets of success
Secrets of successSecrets of success
Secrets of successAdeel Javaid
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcareAdeel Javaid
 
Share point presentation
Share point presentationShare point presentation
Share point presentationAdeel Javaid
 
Project management
Project managementProject management
Project managementAdeel Javaid
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recoveryAdeel Javaid
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mindAdeel Javaid
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategyAdeel Javaid
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production systemAdeel Javaid
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturingAdeel Javaid
 

Mais de Adeel Javaid (20)

Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
What is ph d
What is ph dWhat is ph d
What is ph d
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Project management
Project managementProject management
Project management
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
 
Cloud security
Cloud securityCloud security
Cloud security
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Cybersecurity threat assessment manual

  • 1. SECURITY SELF ASSESMENT qUESTIONNAIRE The following section presents a simple checklist as a tool for top management to help guide their internal review of their company’s cyber resilience capabilities and to enable them to ask the right questions to the teams involved in these initiatives. The questions asked in the tool can help them to identify speciic strengths and weaknesses – and paths to improvement within their respective company. For each of the questions below, companies should choose from the provided options the one that is best relecting the current practices of the company. Each of the options has been given a bullet colour, where: ■ This is the least desirable response; Improvement should clearly be considered. ■ Additional improvement is possible to better protect the company. At the same time, this self assessment questionnaire can be used as a checklist by companies that are just beginning in their information security initiatives, and want to use the questions and answers as a basis for planning their cyber resilience capabilities. ■ This answer is the best relection of resilience against cyber threats. Further, the presence of a more specific checklist under each question will help you to identify and document the status of a set of basic information security controls for your company. Companies can use the referenced principles and actions in the two previous chapters as guidance for improving their resilience related to each of the speciic questions. 1 BELGIAN CYBER SECURITY GUIDE | 35
  • 2. 1. DO YOU EVALUATE HOW SENSITIVE INFORMATION IS WITHIN YOUR COMPANY? ✘  No, but we have a irewall to protect us from theft of information. Yes, we understand the importance of our information and implement general security measures. and we have an information classiication model and know where our sensitive information ✔ Yes, processed. We implement security measures based on the sensitivity of the information. is stored and The following 5 questions are intended to provide you some basic information security checks for your company. Yes Are your sensitive data identiied and classiied? Are you aware of your responsibility regarding the identiied sensitive data? Are the most sensitive data highly protected or encrypted? Is the management of personal private information covered by procedures? Are all employees able to identify and correctly protect sensitive and non sensitive data? LINK TO RELEVANT PRINCIPLE 36 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 2 No
  • 3. SECURITY SELF ASSESSMENT qUESTIONNAIRE 2. DO YOU PERFORM INFORMATION SECURITY RELATED RISk ASSESSMENTS ? ✘  We do not perform risk assessments. We perform risk assessments but not on any speciic information security related topics ✔ We perform risk assessments on speciic information security topics The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Do you address vulnerability results in order of high risk to low risk? Are events that could cause interruptions to business processes identiied and is the impact of the potential related interruptions assessed? Do you have a current business continuity plan that is tested and updated on a regular basis? Do you regularly perform a risk assessment to update the level of protection the data and information need? Are areas of risk identiied throughout your business processes in order to prevent information processing corruption or deliberate misuse? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 3 BELGIAN CYBER SECURITY GUIDE | 37
  • 4. 3. AT WHAT LEVEL IS INFORMATION SECURITY GOVERNANCE IMPLEMENTED? ✘  There is no information security governance in place. Information security governance is installed within the ICT department since that’s where the information needs to be secured. ✔ Information security governance is installed at the corporate level to ensure an impact on the entire company. The following 5 questions are intended to provide you some basic information security checks for your company. Yes Do board members allocate an information security budget? Is information security part the existing risk management of the directors? Does top management approve the information security policy of the company and communicate it by an appropriate way to the employees? Are board members and top management informed on a regular basis of the latest developments in information security policies, standards, procedures and guidelines? Is there at least one oficer part of the management structure in charge of the protection of data and the privacy of personal information? LINK TO RELEVANT PRINCIPLE 38 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 4 No
  • 5. SECURITY SELF ASSESSMENT qUESTIONNAIRE 4. DO YOU HAVE AN INFORMATION SECURITY TEAM OR A DEDICATED INFORMATION SECURITY FUNCTION WITHIN YOUR COMPANY? ✘  We do not have an information security team or speciic roles & responsibilities concerning information security. We do not have an information security team but we have deined speciic information security roles & responsibilities within the company. ✔ We have an information security team or a dedicated information security function. The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Does an identiied information security specialist or team coordinate in house knowledge and provide help to the management in decision making? Is the identiied information security specialist or team responsible to review and systematically update the information security policy based on signiicant changes or incidents? Has the identiied information security specialist or team enough visibility and support to intervene in any information-related initiative in the company? Are there different managers responsible for separate types of data? Is the information security policy feasibility and effectiveness, as well as the information security team’s eficacy, regularly reviewed by an independent body? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 5 BELGIAN CYBER SECURITY GUIDE | 39
  • 6. 5. HOW DOES YOUR COMPANY DEAL WITH INFORMATION SECURITY RISkS FROM SUPPLIERS WHO CAN ACCESS YOUR SENSITIVE INFORMATION? ✘  We have a relationship based on mutual trust with our suppliers. For some contracts we include information security related clauses. processes in place to for ✔ We havesecurity guidelines are validate access andsuppliersbyand suppliers. speciic communicated signed our The following 5 questions are intended to provide you some basic information security checks for your company. Yes Are contractors and suppliers identiied by an ID badge with a recent picture? Do you have policies addressing background checks for contractors and suppliers? Is access to facilities and information systems automatically cut off when a contractor or supplier ends his mission? Do suppliers know how and to whom to immediately report in your company any loss or theft of information? Does your company ensure suppliers keep their software and applications updated with security patches? LINK TO RELEVANT PRINCIPLE 40 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 6 No
  • 7. SECURITY SELF ASSESSMENT qUESTIONNAIRE 6. DOES YOUR COMPANY EVALUATE COMPUTER AND NETWORk SECURITY ON A REGULAR BASIS? ✘  We do not perform audits or penetration tests to evaluate our computer and network security. We do not have a systematic approach for performing security audits and/or penetration tests but execute some on an ad hoc basis. ✔ Regular security audits and/or penetration tests are systematically part of our approach to evaluate our computer and network security. The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Do you test on a regular basis and keep records of identiied threats? Do you have procedures in order to evaluate human threats to your information systems, including dishonesty, social engineering and abuse of trust? Does your company request security audit reports from its information service providers? Is the utility of each type of stored data also assessed during the security audits? Do you audit your information processes and procedures for compliance with the other established policies and standards within the company? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 7 BELGIAN CYBER SECURITY GUIDE | 41
  • 8. 7. WHEN INTRODUCING NEW TECHNOLOGIES, DOES YOUR COMPANY ASSESS POTENTIAL INFORMATION SECURITY RISkS? ✘  Information security is not part of the process for implementing new technologies. Information security is only implemented in the process for new technologies on an ad hoc basis. ✔ Information security is included in the process for implementing new technologies. The following 5 questions are intended to provide you some basic information security checks for your company. Yes When considering implementing new technologies, do you assess their potential impact on the established information security policy? Are there protective measures to reduce risk when implementing new technologies? Are the processes to implement new technologies documented? When implementing new technologies, could your company rely on partnerships, in order that collaborative efforts and critical security information sharing is occurring? Is your company’s information security policy often considered as a barrier to technological opportunities? LINK TO RELEVANT PRINCIPLE 42 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 8 No
  • 9. SECURITY SELF ASSESSMENT qUESTIONNAIRE 8. DOES INFORMATION SECURITY TAkE PLACE WITHIN YOUR COMPANY? ✘  We put trust in our employees and do not consider information security guidance as added value. Only our ICT personnel receives speciic training for securing our ICT-environment. ✔ Regular information security awareness sessions are organised for all employees. The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Are some information security awareness sessions adapted to the activity ield of the employees? Are employee taught to be alert to information security breaches? Does your company have a guideline for users to report security weakness in, or threats to, systems or services? Do employees know how to properly manage credit card data and private personal information? Do third party users (where relevant) also receive appropriate information security training and regular updates in organisational policies and procedures? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 9 BELGIAN CYBER SECURITY GUIDE | 43
  • 10. 9. HOW DO YOU USE PASSWORDS WITHIN THE COMPANY? share passwords with other and/or no ✘ Wepasswords nor for the regularcolleagues passwords.policy exists for the safe usage of change of have unique  All employees, including the management, mandatory. passwords but complexity rules are not enforced. Changing passwords are optional, but not including the management, have ✔ All employees,and must be changed regularly. a personal password that must meet deined password requirements The following 5 questions are intended to provide you some basic information security checks for your company. Yes Did your company establish and enforce a globally-accepted password policy? Can you assure all passwords in your company are not stored into easily accessible iles, bad or blank, default, rarely changed even on mobile devices? Do you feel well protected against unauthorized physical access to system? Are users and contractors aware of their responsibility to protect unattended equipments as well (logoff)? Have employees been taught how to recognise social engineering and react to this threat? LINK TO RELEVANT PRINCIPLE 44 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 10 No
  • 11. SECURITY SELF ASSESSMENT qUESTIONNAIRE 10. IS THERE A COMPANY POLICY IN PLACE FOR THE APPROPRIATE USE OF THE INTERNET AND SOCIAL MEDIA? ✘  No, there is no policy in place for the appropriate use of the internet. Yes, a policy is available on a centralised location accessible to all employees but has not been signed by the employees. policy for ✔ Yes, asigned the the appropriate use of the internet is part of the contract / all employees have policy. The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Are there general communication guidelines and processes for employees in the company, including relation to the press and social media? Is there a disciplinary process for employees violating the company’s communication guidelines? Does an identiied communications responsible or team screen the Internet in order to assess e-reputation risks and status? Has your company assessed its liability for acts of employees or other internal users or attackers abusing the system to perpetrate unlawful acts? Has your company taken measures to prevent an employee or other internal user to attack other sites? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 11 BELGIAN CYBER SECURITY GUIDE | 45
  • 12. 11. DOES YOUR COMPANY MEASURE, REPORT AND FOLLOW-UP ON INFORMATION SECURITY RELATED MATTERS? ✘  We do not monitor, report or follow-up on the eficiency and adequacy of our implemented security measures. Our company has implemented tools and methods to monitor, report and follow-up the eficiency and adequacy of a selection of our implemented security measures. company has implemented the ✔ Ourthe eficiency and adequacy of allnecessary tools and methods to monitor, report and follow-up on our implemented security measures. The following 5 questions are intended to provide you some basic information security checks for your company. Yes Are audit trails and logs relating to the incidents maintained and proactive action taken in a way that the incident doesn’t reoccur? Does your company verify compliance with regulatory and legal requirements (for example: data privacy)? Has your company developed some own tools to assist the management in assessing the security posture and enabling the company to accelerate its ability to mitigate potential risks? Does an information security roadmap including goals, progress evaluation and potential collaborative opportunities exist in your company? Are monitoring reports and incidents reported to authorities and other interest groups such as a sector federation? LINK TO RELEVANT PRINCIPLE 46 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 12 No
  • 13. SECURITY SELF ASSESSMENT qUESTIONNAIRE 12. HOW ARE SYSTEMS kEPT UP-TO-DATE WITHIN YOUR COMPANY ? ✘  We rely on automatic patch management, provided by the vendor, for most of our solutions. Security patches are systematically applied on a monthly basis. a vulnerability management continuously seek information ✔ We have vulnerabilities (for ex. troughprocess in placeonandservice that automatically sendsconcerning possible a subscription a out warnings for new vulnerabilities) and apply patched based on the risks they mitigate. The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Is vulnerability scanning a regular scheduled maintenance task in the company? Is application system reviewed and tested after change in operating system? Can users check themselves the existence of unpatched applications? Are users aware that they also have to keep up-to date the operating system and applications, including security software, of their mobile devices? Are users trained to recognize a legitimate warning message (requesting permission for update, or from fake antivirus) and to properly notify the security team if something bad or questionable has happened? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 13 BELGIAN CYBER SECURITY GUIDE | 47
  • 14. 13. ARE USER ACCESS RIGHTS TO APPLICATIONS AND SYSTEMS REVIEWED AND MANAGED ON A REGULAR BASIS? ✘  Access rights to applications and systems are not consistently removed nor reviewed. Access rights to applications and systems are only removed when an employee is leaving the company. control policy established with regular ✔ An accessapplications andissupporting systems. reviews of assigned user access rights for all relevant business The following 5 questions are intended to provide you some basic information security checks for your company. Yes Is access to electronic information systems and facilities limited by policies and procedures? Does your company rely on a privacy policy stating the information it collects ( for example about your customers: physical addresses, email addresses, browsing history, etc), and is done with it Do the policies and procedures specify methods used to control physical access to secure areas such as door locks, access control systems or video monitoring? Is access to facilities and information systems automatically cut off when members of personnel end employment? Is the sensitive data classiied (Highly Conidential, Sensitive, Internal Use Only,...) and its granted users inventoried? LINK TO RELEVANT PRINCIPLE 48 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 14 No
  • 15. SECURITY SELF ASSESSMENT qUESTIONNAIRE 14. IN YOUR COMPANY, CAN THE EMPLOYEES USE THEIR OWN PERSONAL DEVICES, SUCH AS MOBILE PHONES AND TABLETS, TO STORE OR TRANSFER COMPANY INFORMATION? ✘  Yes, we can store or transfer company information on personal devices without the implementation of extra security measures. A policy exists that prohibits the use of personal devices to store or transfer company information but technically it is possible to do so without implementing extra security measures. can only store transfer company information after the implementation ✔ Personal devices personal deviceorand/or a professional solution has been provided. of security measures on the The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Does your company rely on a well accepted Bring Your Own Device policy? Are mobile devices protected from unauthorised users? Are all devices and connections permanently identiied on the network? Is encryption installed on each mobile device to protect the conidentiality and integrity of data? Is the corporate level aware that while the individual employee may be liable for a device, the company is still liable for the data? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 15 BELGIAN CYBER SECURITY GUIDE | 49
  • 16. 15. HAS YOUR COMPANY TAkEN MEASURES TO PREVENT LOSS OF STORED INFORMATION? ✘  We have no backup/availability process in place. We have a backup/availability process but no restore tests have been performed. process in place that restore/resilience tests. We have ✔ We have a backup/availabilitysecured location or areincludesother high-availability solutions. copies of our backup stored in another using The following 5 questions are intended to provide you some basic information security checks for your company. Yes Are there enough members of the staff able to create retrievable backup and archival copies? Is the equipment protected from power failures by using permanence of power supplies such as multiple feeds, uninterruptible power supply (ups), backup generator etc.? Are the backup media regularly tested to ensure that they could be restored within the time frame allotted in the recovery procedure? Does your company apply reporting procedures for lost or stolen mobile equipment? Are employees trained on what to do if information is accidentally deleted and how to retrieve information in times of disaster? LINK TO RELEVANT PRINCIPLE 50 | BELGIAN CYBER SECURITY GUIDE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 16 No
  • 17. SECURITY SELF ASSESSMENT qUESTIONNAIRE 16. IS YOUR COMPANY PREPARED TO HANDLE AN INFORMATION SECURITY INCIDENT? ✘  We won’t have any incidents. In case we have, our employees are competent enough to cope with it. We have incident management procedures, however not adapted to handle information security incidents. to information security incidents, with the necessary escalation and ✔ We have a dedicated process Wehandle to handle incidents as eficient and effective as possible so we communication mechanisms. strive learn how to better protect ourselves in the future. The following 5 questions are intended to provide you some basic information security checks for your company. Yes No Does your process address different types of incidents ranging from denial of service to breach of conidentiality etc., and ways to handle them? Does your company have an incident management communication plan? Do you know which authorities to notify and how in case of incident? Does your company have contact information sorted and identiied for each type of incident? Do you rely on an Internal Communication responsible for contacts with employees and their families? LINK TO RELEVANT PRINCIPLE POTENTIAL ACTIONS TO IMPROVE YOUR RESPONSE 17 BELGIAN CYBER SECURITY GUIDE | 51