Governance & Compliance Terms
81 terms
Security measures that automatically adjust based on the detection of unusual activity patterns.
Formal declaration validating adherence to standards like PCI DSS, issued by qualified auditors.
Systems that automatically detect, schedule, and deploy patches to address software vulnerabilities.
Systematic compliance verification.
Record of blockchain transactions and changes.
Standards for regulatory compliance in blockchain.
Tracking blockchain regulation adherence.
Structure for blockchain management.
Analyzing data from bug bounty programs to improve vulnerability detection and remediation processes.
Strategies to improve the efficiency and effectiveness of bug bounty programs in uncovering security flaws.
Guidelines and practices to secure networks while accommodating employee-owned devices.
Automating security validations throughout the continuous integration and continuous delivery pipelines.
Automating regulatory compliance checks by encoding policies directly into software development processes.
Formal evaluation against regulatory frameworks like HIPAA or SOC 2.
Timeline tracking of regulatory deadlines.
Validation of regulatory controls.
Platform for managing compliance records.
Gathering proof of regulatory adherence.
Framework for measuring compliance effectiveness.
Visual tracking of regulatory adherence.
Evaluation of regulatory risk exposure.
Educational system for regulatory requirements.
Automated compliance process management.
Automated processes to deploy essential software patches quickly to reduce vulnerability windows.
A method of ranking vulnerabilities based on the criticality of the affected assets.
Metrics that assess and score an organization's basic security practices to highlight areas for improvement.
Evaluating an organization's cyber risk profile to determine appropriate insurance coverage and premiums.
Simulated environments used to train cybersecurity professionals in realistic attack and defense scenarios.
Documented policies ensuring adherence to relevant laws and regulations.
Frameworks that assess and guide an organization's progression in implementing robust security practices.
Structured approaches that integrate multiple security tools and processes into a unified defense strategy.
Benchmarks like NIST 800-53 guiding security control implementation.
Rules requiring local data storage.
Legal contract for data handling.
Standard data handling contract.
Validation of privacy measures.
Mandated privacy oversight position.
National laws requiring data to stay within borders.
Contract for data movement.
Distributing security monitoring and response functions across multiple locations or teams for greater resilience.
The seamless incorporation of security practices into continuous development and deployment processes.
Specific individual rights under EU privacy law.
EU regulation enforcing transparent personal data handling and user rights.
Integrated framework managing organizational security objectives and legal obligations.
Logging systems engineered so that once data is recorded, it cannot be altered or deleted, ensuring audit integrity.
Systems that continuously verify adherence to security and regulatory standards across an organization.
Web-based tools offering hands-on cybersecurity training through interactive simulations.
Guidelines ensuring that connected medical devices are safeguarded against cyber vulnerabilities.
US agency developing cybersecurity frameworks and guidelines.
Security requirements for organizations handling credit card transactions.
International data transfer agreement.
Educational system for privacy awareness.
Continuous monitoring of an organization's security health to identify and remediate vulnerabilities promptly.
Tracking and implementing regulatory updates.
Monitoring regulatory updates.
Platform for submitting regulatory documents.
System for tracking regulatory changes.
Automated compliance reporting systems.
System for generating compliance reports.
Structure for compliance reporting.
Test environment for compliance validation.
Technology used to manage regulatory compliance.
Connecting compliance systems.
Prioritizing vulnerability assessments based on the potential impact and likelihood of exploitation.
The application of game mechanics to cybersecurity training to increase user engagement and retention.
Tools that automate the process of checking and maintaining security compliance.
Aligning security controls with compliance requirements.
The process of linking disparate security tools into a unified, cohesive defense framework.
The use of automated systems to enforce, update, and monitor security policies across an organization.
Automated management and implementation of security policies across different tools and platforms.
Security assessment of blockchain-based automated contracts.
Management of decentralized contract systems.
Risk protection for blockchain contracts.
Collection of secure contract templates.
Database of blockchain contracts.
The systematic review and testing of blockchain smart contracts to identify vulnerabilities and ensure reliability.
Ensuring that a complete and secure inventory of software components is maintained for vulnerability tracking.
Auditing standard for reporting on internal controls.
Evaluating and mitigating risks associated with third-party vendors and supply chain partners.
Formal initiatives that enable researchers to report security flaws responsibly and securely.
Comprehensive tracking of vulnerabilities from initial discovery through to remediation and closure.