Technology infrastructure plan
Technology infrastructure plan: A document that outlines the design, implementation, and maintenance of an organization’s technology infrastructure. It is used to align technology investments with business goals and to ensure the availability, performance, and security of the infrastructure. Examples include plans for deploying new servers, upgrading network components, and implementing disaster recovery procedures.
Succession planning
Succession planning: The process of identifying and developing potential future leaders to replace existing ones when they leave, retire, or can no longer serve. In the context of security, it ensures leadership continuity, critical for managing and safeguarding an organization’s assets. This preparation helps prevent gaps in security operations, ensuring smooth transitions and ongoing protection […]
Supply Chain Management (SCM)
Supply Chain Management (SCM): The management of hardware, software, and services sourcing from external suppliers in IT. It involves overseeing supplier relationships, monitoring supply chain risks, ensuring security and reliability of IT components, and protecting against vulnerabilities from third-party vendors.
Supply chain risks
Supply chain risks: IT supply chain risks involve potential vulnerabilities that can arise from third-party suppliers, such as compromised components or software. These risks require thorough vetting, monitoring, and management strategies to safeguard the integrity and security of IT systems and data across the entire supply chain.
Suspension
Suspension: The temporary disabling of access privileges or other capabilities. In a security context, a user’s account might be suspended due to suspicious activity, violations of policy, or as part of a user offboarding process. Suspension is often used as a preventive measure, allowing for investigations or remediation activities to take place without further potential […]
SWIFT Security Control Framework
SWIFT Security Control Framework: A set of mandatory and advisory security controls for SWIFT users. It provides a clear baseline for users to secure their local environments, protect the broader SWIFT community, and help prevent fraud within the financial sector. The controls are divided into three objectives – secure your environment, know and limit access, […]