Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
GV.OV-02.1: The information and cybersecurity risk management strategy shall be reviewed and adjusted to ensure coverage of organisational requirements and risks. |
|
GV.OV-02.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p30 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
The goal of this control is to ensure that the information and cybersecurityrisk management strategyis regularly reviewed and updated to reflect organisational needs, evolving risks, and compliance requirements. To achieve this goal, the following should be considered: - The strategy should define the overall direction and goals for managing information and cybersecurity risks. - Supporting policies and procedures should guide how the strategy is implemented in practice. - The strategy should address risks to organisational operations, assets, individuals, and other entities, including potential privacy impacts. - Reviews should be conducted at planned intervals, including through internal audits, based on a documented audit program that defines frequency, methods, responsibilities, and reporting. - Audits should be carried out by competent and impartial personnel. - Audit results should be reviewed to assess whether the strategy meets internal expectations and complies with legal and regulatory requirements. - The strategy should be updated when necessary, especially after incidents or audit findings. - Evidence of audit activities and outcomes should be documented and reported to relevant management. |
|
A general note, for any purpose. |
The goal of this control is to ensure that the information and cybersecurityrisk management strategyis regularly reviewed and updated to reflect organisational needs, evolving risks, and compliance requirements. To achieve this goal, the following should be considered: • The strategy should define the overall direction and goals for managing information and cybersecurity risks. • Supporting policies and procedures should guide how the strategy is implemented in practice. • The strategy should address risks to organisational operations, assets, individuals, and other entities, including potential privacy impacts. • Reviews should be conducted at planned intervals, including through internal audits, based on a documented audit program that defines frequency, methods, responsibilities, and reporting. • Audits should be carried out by competent and impartial personnel. • Audit results should be reviewed to assess whether the strategy meets internal expectations and complies with legal and regulatory requirements. • The strategy should be updated when necessary, especially after incidents or audit findings. • Evidence of audit activities and outcomes should be documented and reported to relevant management. |
|
A general note, for any purpose. |
The goal of this control is to ensure that the information and cybersecurityrisk management strategyis regularly reviewed and updated to reflect organisational needs, evolving risks, and compliance requirements. To achieve this goal, the following should be considered: - The strategy should define the overall direction and goals for managing information and cybersecurity risks. - Supporting policies and procedures should guide how the strategy is implemented in practice. - The strategy should address risks to organisational operations, assets, individuals, and other entities, including potential privacy impacts. - Reviews should be conducted at planned intervals, including through internal audits, based on a documented audit program that defines frequency, methods, responsibilities, and reporting. - Audits should be carried out by competent and impartial personnel. - Audit results should be reviewed to assess whether the strategy meets internal expectations and complies with legal and regulatory requirements. - The strategy should be updated when necessary, especially after incidents or audit findings. - Evidence of audit activities and outcomes should be documented and reported to relevant management. |
|
A general note, for any purpose. |
<div><p>The goal of this control is to ensure that the information and cybersecurityrisk management strategyis regularly reviewed and updated to reflect organisational needs, evolving risks, and compliance requirements. To achieve this goal, the following should be considered:</p><ul><li>The strategy should define the overall direction and goals for managing information and cybersecurity risks.</li><li>Supporting policies and procedures should guide how the strategy is implemented in practice.</li><li>The strategy should address risks to organisational operations, assets, individuals, and other entities, including potential privacy impacts.</li><li>Reviews should be conducted at planned intervals, including through internal audits, based on a documented audit program that defines frequency, methods, responsibilities, and reporting.</li><li>Audits should be carried out by competent and impartial personnel.</li><li>Audit results should be reviewed to assess whether the strategy meets internal expectations and complies with legal and regulatory requirements.</li><li>The strategy should be updated when necessary, especially after incidents or audit findings.</li><li>Evidence of audit activities and outcomes should be documented and reported to relevant management.</li></ul></div> |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
GV.OV-02.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Risk management strategy review |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
The information and cybersecurity risk management strategy shall be reviewed and adjusted to ensure coverage of organisational requirements and risks. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
17 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 19 of 19
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1