CAPTUR

A Journey to the Highest Cybersecurity Maturity: Compliance, Part 8 | by Vicente Aceituno Canal

Compliance Management

Zoom image will be displayed

Photo by Anne Nygård on Unsplash

Previously in this series:

The inputs of this cycle are:

  • Certification Report (for the last period)
  • Audit Report (for the last period)
  • List of Requirements from Best Practices and Standards (for the last period)
  • List of Requirements from Laws and Regulations (for the last period)
  • Information Security Meeting Minutes (with investigation of reports and agreed actions) (for the last period)

The outputs of this cycle are:

  • Certification Report (for the last period)
  • Audit Report (for the last period)
  • List of Requirements from Best Practices and Standards (for the last period)
  • List of Requirements from Laws and Regulations (for the last period)

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button