APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Compliance
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Welcoming Big Data Technology amidst Changes

    Darren Cockrel, CIO, Coyote Logistics

    Leveraging Compliance to Your Advantage

    Mark Bloom, Global CIO, Aegon

    Demystifying the Role of IT in Millennial Organizations

    Jeff Fithian, VP, Strategic Initiatives and CIO, Dynamic Materials Corporation

    Productivity and Security- Can you ever have both?

    Julie Cullivan, SVP, Business Operations & CIO, Fireeye

    Lessons Learned from a CIO

    John Miller, Vice President and CIO, American Textile Company

    New Hr Capabilities To Face Evolving Technologies

    Anti Deisnasari, Director Of Compliance, Seabank Indonesia

    Strengthening The Compliance Fortress In The Banking Sector

    Chuan Lim Ang, Managing Director And Sg Head Of Compliance, Cimb

    Navigating Legal Challenges By Adapting To Technological Shifts

    Valerie Feria Amante, Chief Legal, Ethics & Compliance Officer, Jollibee Group Of Companies

    right

    Cyber Grc:Core Enabler Of Strategic Cybersecurity

    Jamie Sanderson, Director Of Cyber Governance, Risk, And Compliance, Aes

    Tweet
    content-image

    Jamie Sanderson, Director Of Cyber Governance, Risk, And Compliance, Aes

    Cyber governance, risk, and compliance (Cyber GRC) is the core enabler of strategic cybersecurity. Cybersecurity exists to support the organization in achieving its business objectives by securing assets and minimizing cyber risk. The strategy outlines the goals and priorities, and determines actions and timelines, also stated as the roadmap. The cybersecurity strategy should be continuously updated as the organization’s goals and operating environment change. A fundamental responsibility of Cyber GRC is to reflect the cybersecurity strategy in the cybersecurity policies, standards, and operating model.

    Policies are often the focus of governance and provide a foundation for GRC. The policies explain why programs are implemented and how they support the strategic goals defined for cybersecurity. Standards are also created for each policy to provide more specific requirements of what must be done. With clear strategic direction provided through documentation of policies and standards, the cybersecurity team and stakeholders are empowered to drive a security-conscious culture and proactive approach to security as new projects are implemented to achieve the business mission and objectives.

    Risk management is central to keeping the cybersecurity strategy and documentation fit for purpose. Through implementing a process for identification of risks, threats, and vulnerabilities, Cyber GRC provides organization specific information regarding the operating environment which can be helpful in prioritization and updating the cybersecurity strategy as required. The process to understand high-risk areas should include input from all aspects of the business to determine reasonable risk profiles, risk ownership and risk action plans.

    Compliance together with risk management provides key feedback that enables cybersecurity leadership to monitor strategic execution. Unfortunately, compliance is often considered and deployed as a “check the box” activity. Compliance should also provide indicators of program success and useful information much like metrics to measure results and signal areas where wider issues may exist. Controls are the countermeasures implemented for each standard to avoid, detect, and reduce cybersecurity risks. In the compliance process, regular confirmation of the control’s design and effectiveness can provide benchmarks of the security posture and indicators of progress against cybersecurity objectives. Controls should be strongly aligned with the cybersecurity metrics. Controls and metrics provide greatest value when they deliver leading and lagging indicators.

    Cyber Grc Must Be Directly Integrated In All Cybersecurity Programs To Effectively Enable Execution Of The Cybersecurity Strategy

    The elements of governance, risk, and compliance deliver a cyber framework for the organization. In terms of cybersecurity, a framework provides an approach to deliver on the cybersecurity program and organize requirements. This should be customized to your organization’s cybersecurity strategy and operating model. There are many frameworks available including NIST Cybersecurity Framework (NIST CSF) which provide useful approaches to organizing cyber resiliency requirements. Existing frameworks should be used as a point of reference or guide. Beware of simply copying any framework that exists regardless of how well adopted. It is highly unlikely that any industry framework, best practice, or standard will completely align with the cybersecurity strategy defined for your organization.

    Cyber GRC must be directly integrated in all cybersecurity programs to effectively enable execution of the cybersecurity strategy. Ultimately, cybersecurity leadership will need to answer the question: What actions are necessary to achieve cybersecurity goals with measurable outcomes? Implementing governance (policies, standards, controls), risk(assessment, prioritization), and compliance (status, metrics) builds the foundation for delivering on the strategy and provides critical information so that the strategy can be updated to meet the organization’s mission and objectives amid the shifting operating environment.

    tag

    GRC

    Weekly Brief

    loading
    Top 10 Compliance Solutions Providers in APAC - 2025
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://compliance.apacciooutlook.com/views/cyber-grccore-enabler-of-strategic-cybersecurity-nwid-9114.html