Cybersecurity Program Best Practices cover art

Cybersecurity Program Best Practices

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Cybersecurity Program Best Practices

By: United States Department of Labor
Narrated by: Tom Brooks
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £6.99

Buy Now for £6.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Cybersecurity Program Best Practices

ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks.

The Employee Benefits Security Administration has prepared the following best practices for use by recordkeepers and other service providers responsible for plan-related IT systems and data, and for plan fiduciaries making prudent decisions on the service providers they should hire. Plans’ service providers should:

  1. Have a formal, well-documented cybersecurity program.
  2. Conduct prudent annual risk assessments.
  3. Have a reliable, annual third-party audit of security controls.
  4. Clearly define and assign information security roles and responsibilities.
  5. Have strong access control procedures.
  6. Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments.
  7. Conduct periodic cybersecurity awareness training.
  8. Implement and manage a secure system development life-cycle (SDLC) program.
  9. Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response.
  10. Encrypt sensitive data, stored and in transit.
  11. Implement strong technical controls in accordance with best security practices.
  12. Appropriately respond to any past cybersecurity incidents.
©2021 Tom Brooks (P)2021 Tom Brooks
Security & Encryption Computer Security Hacking Business
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

The Ultimate Exam Prep A Comprehensive Study Guide for the AWS Certified Solutions Architect cover art
Quality Assurance cover art
Cyber Essentials cover art
Zero Trust and Third-Party Risk cover art
Introduction to Cyber Security: Fundamentals cover art
Cyber Intelligence Driven Risk cover art
Nine Steps to Success cover art
CompTIA Security+ cover art
ITIL Lifecycle Essentials cover art
Essential CISA Exam Guide: Updated for the 26th Edition cover art
Business Continuity Management cover art
Cybersecurity for Beginners cover art
ISO27001/ISO27002: A Pocket Guide cover art
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide cover art
Certified Information Security Manager CISM Study Guide cover art
Prepare for the ISACA Certified Information Security Manager Exam cover art

What listeners say about Cybersecurity Program Best Practices

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.