Audible会員は対象作品が聴き放題、2か月無料体験キャンペーン中

聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。

2024年5月9日まで2か月無料体験キャンペーン中!詳細はこちらをご確認ください
会員は12万以上の対象作品が聴き放題、アプリならオフライン再生可能
プロの声優や俳優の朗読も楽しめる
Audibleでしか聴けない本やポッドキャストも多数
無料体験終了後は月会費1,500円。いつでも退会できます。
『Cybersecurity Program Best Practices』のカバーアート

Cybersecurity Program Best Practices

著者: United States Department of Labor
ナレーター: Tom Brooks
¥ 630で会員登録し購入

無料体験終了後は月額¥1,500。いつでも退会できます。

¥ 900 で購入

¥ 900 で購入

下4桁がのクレジットカードで支払う
ボタンを押すと、Audibleの利用規約およびAmazonのプライバシー規約同意したものとみなされます。支払方法および返品等についてはこちら

あらすじ・解説

Cybersecurity Program Best Practices

ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks.

The Employee Benefits Security Administration has prepared the following best practices for use by recordkeepers and other service providers responsible for plan-related IT systems and data, and for plan fiduciaries making prudent decisions on the service providers they should hire. Plans’ service providers should:

  1. Have a formal, well-documented cybersecurity program.
  2. Conduct prudent annual risk assessments.
  3. Have a reliable, annual third-party audit of security controls.
  4. Clearly define and assign information security roles and responsibilities.
  5. Have strong access control procedures.
  6. Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments.
  7. Conduct periodic cybersecurity awareness training.
  8. Implement and manage a secure system development life-cycle (SDLC) program.
  9. Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response.
  10. Encrypt sensitive data, stored and in transit.
  11. Implement strong technical controls in accordance with best security practices.
  12. Appropriately respond to any past cybersecurity incidents.
©2021 Tom Brooks (P)2021 Tom Brooks

Cybersecurity Program Best Practicesに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。