Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
GV.OC-02.1: The organisation shall demonstrate it understands and considers the needs and expectations of both internal and external stakeholders regarding information and cybersecurity risk management. |
|
GV.OC-02.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p12 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
<div><p>The goal of this control is to ensure that the organisation understands and takes into account the needs and expectations of both internal and external stakeholders when managing information and cybersecurity risks. This helps to align cybersecurity efforts with business priorities, legal obligations, and stakeholder trust. To achieve this goal, the following should be considered:</p><ul><li>The organisation should identify key internal stakeholders such as employees, senior management, board members, and internal auditors.Theirroles, responsibilities, and expectations related to cybersecurityshould be understood and documented.</li><li>Key external stakeholders, including customers, suppliers, partners, regulators, shareholders, service pro- viders, and external auditors, should be identified, and their compliance, contractual, and data protection expectations should be considered.</li><li>Stakeholder needs and expectations should be gathered through methods such as interviews, surveys, contract reviews, or regulatory analysis.</li><li>These insights should be integrated into the organisation’s cybersecurityrisk management strategyto ensure alignment with business and regulatory priorities.</li><li>Regular communication channels should be established to keep stakeholders informed and engaged in cybersecurity matters.</li><li>Stakeholder expectations should be reviewed and updated periodically, especially when there are changes in business operations, legal requirements, or risk exposure.</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to ensure that the organisation understands and takes into account the needs and expectations of both internal and external stakeholders when managing information and cybersecurity risks. This helps to align cybersecurity efforts with business priorities, legal obligations, and stakeholder trust. To achieve this goal, the following should be considered: • The organisation should identify key internal stakeholders such as employees, senior management, board members, and internal auditors.Theirroles, responsibilities, and expectations related to cybersecurityshould be understood and documented. • Key external stakeholders, including customers, suppliers, partners, regulators, shareholders, service pro- viders, and external auditors, should be identified, and their compliance, contractual, and data protection expectations should be considered. • Stakeholder needs and expectations should be gathered through methods such as interviews, surveys, contract reviews, or regulatory analysis. • These insights should be integrated into the organisation’s cybersecurityrisk management strategyto ensure alignment with business and regulatory priorities. • Regular communication channels should be established to keep stakeholders informed and engaged in cybersecurity matters. • Stakeholder expectations should be reviewed and updated periodically, especially when there are changes in business operations, legal requirements, or risk exposure. |
|
A general note, for any purpose. |
The goal of this control is to ensure that the organisation understands and takes into account the needs and expectations of both internal and external stakeholders when managing information and cybersecurity risks. This helps to align cybersecurity efforts with business priorities, legal obligations, and stakeholder trust. To achieve this goal, the following should be considered: - The organisation should identify key internal stakeholders such as employees, senior management, board members, and internal auditors.Theirroles, responsibilities, and expectations related to cybersecurityshould be understood and documented. - Key external stakeholders, including customers, suppliers, partners, regulators, shareholders, service pro- viders, and external auditors, should be identified, and their compliance, contractual, and data protection expectations should be considered. - Stakeholder needs and expectations should be gathered through methods such as interviews, surveys, contract reviews, or regulatory analysis. - These insights should be integrated into the organisation’s cybersecurityrisk management strategyto ensure alignment with business and regulatory priorities. - Regular communication channels should be established to keep stakeholders informed and engaged in cybersecurity matters. - Stakeholder expectations should be reviewed and updated periodically, especially when there are changes in business operations, legal requirements, or risk exposure. |
|
A general note, for any purpose. |
The goal of this control is to ensure that the organisation understands and takes into account the needs and expectations of both internal and external stakeholders when managing information and cybersecurity risks. This helps to align cybersecurity efforts with business priorities, legal obligations, and stakeholder trust. To achieve this goal, the following should be considered: - The organisation should identify key internal stakeholders such as employees, senior management, board members, and internal auditors.Theirroles, responsibilities, and expectations related to cybersecurityshould be understood and documented. - Key external stakeholders, including customers, suppliers, partners, regulators, shareholders, service pro- viders, and external auditors, should be identified, and their compliance, contractual, and data protection expectations should be considered. - Stakeholder needs and expectations should be gathered through methods such as interviews, surveys, contract reviews, or regulatory analysis. - These insights should be integrated into the organisation’s cybersecurityrisk management strategyto ensure alignment with business and regulatory priorities. - Regular communication channels should be established to keep stakeholders informed and engaged in cybersecurity matters. - Stakeholder expectations should be reviewed and updated periodically, especially when there are changes in business operations, legal requirements, or risk exposure. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
GV.OC-02.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Stakeholder needs and expectations |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
The organisation shall demonstrate it understands and considers the needs and expectations of both internal and external stakeholders regarding information and cybersecurity risk management. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
17 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 19 of 19
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1