List five common work functions for the proper management of regulatory compliance listed in the EBK.

What will be an ideal response?


1. Establish and administer a risk-based enterprise information security program that addresses applicable standards, procedures, directives, policies, regulations, and laws (statutes)
2. Define the enterprise information security compliance program
3. Coordinate and provide liaison with staffs that are responsible for information security compliance, licensing and registration, and data security surveillance
4. Identify and stay current on all external laws, regulations, standards, and best practices applicable to the organization
5. Identify major enterprise risk factors (product, compliance, and operational) and coordinate the application of information security strategies, plans, policies, and procedures to reduce regulatory risk
6. Maintain relationships with all regulatory information security organizations and appropriate industry groups, forums, and stakeholders
7. Keep informed on pending information security changes, trends, and best practices by participating in collaborative settings.
8. Acquire the necessary resources to support an effective information security compliance program
9. Establish an enterprise information security compliance performance measures program
10. Ensure that appropriate changes and improvement actions are implemented as required

Computer Science & Information Technology

You might also like to view...

In the accompanying illustration, item D shows which step in the podcasting process?

A. When you create the content B. When you save the content C. Where you save the content D. When you download the content

Computer Science & Information Technology

Which protocol is responsible for addressing and routing packets to their destination?

a. IP b. POP c. SMTP d. TCP

Computer Science & Information Technology

A file created in ____ is called a document and has a .docx extension.

A. Word B. Excel C. Publisher D. PowerPoint

Computer Science & Information Technology

Determining which method to call at runtime based on which object invokes the method describes ____.

A. abstraction B. virtual method calls C. dynamic binding D. encapsulation

Computer Science & Information Technology