SlideShare uma empresa Scribd logo
1 de 1
Access Control
1. User Access Review Timeliness
2. Unauthorized Access Incidents
1. Delays in user access reviews
2. Instances of unauthorized access
Change Management
3. Change Request Handling Time
4. Failed Changes
3. Delays in handling change requests
4. Unsuccessful or unauthorized changes
IT Security Awareness
5. Employee Security Training
Completion
6. Policy Acknowledgment
5. Lack of awareness in security
6. Policy non-compliance by employees
IT Asset Management 7. Asset Inventory Accuracy
8. Unauthorized Asset Changes
7. Incomplete or inaccurate asset data
8. Unauthorized asset modifications
Security Patch
Management
9. Timeliness of Security Patching
10. Patch Compliance Rate
9. Delays in applying security patches
10. Low compliance with patching
Data Backup and
Recovery
11. Backup Completion Timeliness
12. Data Recovery Success Rate
11. Backup failures or delays
12. Ineffective data recovery
Incident Response 13. Incident Response Time
14. Incident Escalation Rate
13. Slow response to security incidents
14. Increased incidents due to delays
Vendor Risk
Management
15. Vendor Risk Assessment
Completion
16. Vendor Compliance Monitoring
15. Incomplete or skipped assessments
16. Vendor non-compliance incidents
Compliance with
Regulations
17. Regulatory Compliance
18. Audit Trail Accuracy
17. Non-compliance with IT regulations
18. Missing or tampered audit logs
Category KPIs KRIs
IT General Controls KPIs and KRIs
Evaluate the effectiveness and risks of IT general controls to ensure a secure and compliant IT
environment.

Mais conteúdo relacionado

Mais procurados

Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIsBim Akinfenwa
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentationBokangMalunga
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and MitigationsApril Mardock CISSP
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Cyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationCyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationDavid X Martin
 
Risk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation SlidesRisk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation SlidesSlideTeam
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And AnalysisLalit Kale
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 

Mais procurados (20)

Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIs
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Cyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationCyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantification
 
Risk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation SlidesRisk Management Plan PowerPoint Presentation Slides
Risk Management Plan PowerPoint Presentation Slides
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 

Semelhante a IT General Controls Key Performance Indicator & Key Risk Indicator

FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsBim Akinfenwa
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsBim Akinfenwa
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsBim Akinfenwa
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsBim Akinfenwa
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIsBim Akinfenwa
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIsBim Akinfenwa
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIsBim Akinfenwa
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsBim Akinfenwa
 
Nebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setNebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setFaizan Khan
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...ControlCase
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance MonitoringKimberly Simon MBA
 
Form p1005 policy on client file
Form p1005 policy on client fileForm p1005 policy on client file
Form p1005 policy on client fileKevin Oulette
 
Predictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptxPredictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptxrahulkuduthini
 
TGA presentation: Data Integrity - an international regulatory perspective
TGA presentation: Data Integrity - an international regulatory perspectiveTGA presentation: Data Integrity - an international regulatory perspective
TGA presentation: Data Integrity - an international regulatory perspectiveTGA Australia
 

Semelhante a IT General Controls Key Performance Indicator & Key Risk Indicator (18)

RMF KPIs and KRIs
RMF KPIs and KRIsRMF KPIs and KRIs
RMF KPIs and KRIs
 
FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIs
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIs
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIs
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIs
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIs
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIs
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIs
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIs
 
BCDR KPIs and KRIs
BCDR KPIs and KRIsBCDR KPIs and KRIs
BCDR KPIs and KRIs
 
Nebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setNebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this set
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
Breach response
Breach responseBreach response
Breach response
 
Data integrity challenges and solutions
Data integrity challenges and solutionsData integrity challenges and solutions
Data integrity challenges and solutions
 
Form p1005 policy on client file
Form p1005 policy on client fileForm p1005 policy on client file
Form p1005 policy on client file
 
Predictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptxPredictive Maintenance with Machine Learning.pptx
Predictive Maintenance with Machine Learning.pptx
 
TGA presentation: Data Integrity - an international regulatory perspective
TGA presentation: Data Integrity - an international regulatory perspectiveTGA presentation: Data Integrity - an international regulatory perspective
TGA presentation: Data Integrity - an international regulatory perspective
 

Mais de Bim Akinfenwa

SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsBim Akinfenwa
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Bim Akinfenwa
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioBim Akinfenwa
 
In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!Bim Akinfenwa
 
5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignoredBim Akinfenwa
 
Future of wearable devices 2016
Future of wearable devices 2016Future of wearable devices 2016
Future of wearable devices 2016Bim Akinfenwa
 
Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Bim Akinfenwa
 
5 Quotes to get over the lonely days
5 Quotes to get over the lonely days5 Quotes to get over the lonely days
5 Quotes to get over the lonely daysBim Akinfenwa
 
Project status one page
Project status one pageProject status one page
Project status one pageBim Akinfenwa
 
Epic content marketing strategy
Epic content marketing strategyEpic content marketing strategy
Epic content marketing strategyBim Akinfenwa
 
Product Release Road-map Guide
Product Release Road-map GuideProduct Release Road-map Guide
Product Release Road-map GuideBim Akinfenwa
 
Product user persona
Product user personaProduct user persona
Product user personaBim Akinfenwa
 

Mais de Bim Akinfenwa (13)

SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIs
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:
 
SDLC KPIs and KRIs
SDLC KPIs and KRIsSDLC KPIs and KRIs
SDLC KPIs and KRIs
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!
 
5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored
 
Future of wearable devices 2016
Future of wearable devices 2016Future of wearable devices 2016
Future of wearable devices 2016
 
Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063
 
5 Quotes to get over the lonely days
5 Quotes to get over the lonely days5 Quotes to get over the lonely days
5 Quotes to get over the lonely days
 
Project status one page
Project status one pageProject status one page
Project status one page
 
Epic content marketing strategy
Epic content marketing strategyEpic content marketing strategy
Epic content marketing strategy
 
Product Release Road-map Guide
Product Release Road-map GuideProduct Release Road-map Guide
Product Release Road-map Guide
 
Product user persona
Product user personaProduct user persona
Product user persona
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

IT General Controls Key Performance Indicator & Key Risk Indicator

  • 1. Access Control 1. User Access Review Timeliness 2. Unauthorized Access Incidents 1. Delays in user access reviews 2. Instances of unauthorized access Change Management 3. Change Request Handling Time 4. Failed Changes 3. Delays in handling change requests 4. Unsuccessful or unauthorized changes IT Security Awareness 5. Employee Security Training Completion 6. Policy Acknowledgment 5. Lack of awareness in security 6. Policy non-compliance by employees IT Asset Management 7. Asset Inventory Accuracy 8. Unauthorized Asset Changes 7. Incomplete or inaccurate asset data 8. Unauthorized asset modifications Security Patch Management 9. Timeliness of Security Patching 10. Patch Compliance Rate 9. Delays in applying security patches 10. Low compliance with patching Data Backup and Recovery 11. Backup Completion Timeliness 12. Data Recovery Success Rate 11. Backup failures or delays 12. Ineffective data recovery Incident Response 13. Incident Response Time 14. Incident Escalation Rate 13. Slow response to security incidents 14. Increased incidents due to delays Vendor Risk Management 15. Vendor Risk Assessment Completion 16. Vendor Compliance Monitoring 15. Incomplete or skipped assessments 16. Vendor non-compliance incidents Compliance with Regulations 17. Regulatory Compliance 18. Audit Trail Accuracy 17. Non-compliance with IT regulations 18. Missing or tampered audit logs Category KPIs KRIs IT General Controls KPIs and KRIs Evaluate the effectiveness and risks of IT general controls to ensure a secure and compliant IT environment.