Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
GV.RM-01.1: Information/cybersecurity objectives shall be identified, agreed to by organisational stakeholders and approved by senior management |
|
GV.RM-01.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p17 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p15 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
<div><p>To support this objective, organisations should:</p><ul><li>Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically:<ul><li>Clause 6.1 should be used to establish a structured risk assessment process.</li><li>Clause 6.3 should guide the definition of appropriate risk treatment strategies.</li></ul></li><li>Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes.</li><li>In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks.</li><li>Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems).</li><li>Use these objectives to measure and manage risk and performance across the organisation.</li></ul></div> |
|
A general note, for any purpose. |
To support this objective, organisations should: • Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically: o Clause 6.1 should be used to establish a structured risk assessment process. o Clause 6.3 should guide the definition of appropriate risk treatment strategies. • Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes. • In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks. • Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems). • Use these objectives to measure and manage risk and performance across the organisation. |
|
A general note, for any purpose. |
To support this objective, organisations should: - Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically: - Clause 6.1 should be used to establish a structured risk assessment process. - Clause 6.3 should guide the definition of appropriate risk treatment strategies. - Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes. - In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks. - Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems). - Use these objectives to measure and manage risk and performance across the organisation. |
|
A general note, for any purpose. |
To support this objective, organisations should: - Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically: - Clause 6.1 should be used to establish a structured risk assessment process. - Clause 6.3 should guide the definition of appropriate risk treatment strategies. - Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes. - In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks. - Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems). - Use these objectives to measure and manage risk and performance across the organisation. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
GV.RM-01.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Cybersecurity objectives approval |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
Information/cybersecurity objectives shall be identified, agreed to by organisational stakeholders and approved by senior management |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
1 |
|
|
The number of triples associated with the subject. |
22 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 24 of 24
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1