Have a formal, well documented cybersecurity program.
Have a formal, well documented cybersecurity program. Have in place
Have a formal, well documented cybersecurity program. Not yet, but planning to have in place.
Have a formal, well documented cybersecurity program. Don't have in place.
Have a formal, well documented cybersecurity program. Don't know.
Have a formal, well documented cybersecurity program.
Conduct prudent annual risk assessments.
Conduct prudent annual risk assessments. Have in place
Conduct prudent annual risk assessments. Not yet, but planning to have in place.
Conduct prudent annual risk assessments. Don't have in place.
Conduct prudent annual risk assessments. Don't know.
Conduct prudent annual risk assessments.
Have a reliable annual third party audit of security controls.
Have a reliable annual third party audit of security controls. Have in place
Have a reliable annual third party audit of security controls. Not yet, but planning to have in place.
Have a reliable annual third party audit of security controls. Don't have in place.
Have a reliable annual third party audit of security controls. Don't know.
Have a reliable annual third party audit of security controls.
Clearly define and assign information security roles and responsibilities.
Clearly define and assign information security roles and responsibilities. Have in place
Clearly define and assign information security roles and responsibilities. Not yet, but planning to have in place.
Clearly define and assign information security roles and responsibilities. Don't have in place.
Clearly define and assign information security roles and responsibilities. Don't know.
Clearly define and assign information security roles and responsibilities.
Have strong access control procedures.
Have strong access control procedures. Have in place
Have strong access control procedures. Not yet, but planning to have in place.
Have strong access control procedures. Don't have in place.
Have strong access control procedures. Don't know.
Have strong access control procedures.
Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments.
Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments. Have in place
Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments. Not yet, but planning to have in place.
Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments. Don't have in place.
Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments. Don't know.
Ensure that any assets or data stored in a cloud or managed by a third party service provider are subject to appropriate security reviews and independent security assessments.
Conduct periodic cybersecurity awareness training.
Conduct periodic cybersecurity awareness training. Have in place
Conduct periodic cybersecurity awareness training. Not yet, but planning to have in place.
Conduct periodic cybersecurity awareness training. Don't have in place.
Conduct periodic cybersecurity awareness training. Don't know.
Conduct periodic cybersecurity awareness training.
Implement and manage a secure system development life cycle (SDLC) program.
Implement and manage a secure system development life cycle (SDLC) program. Have in place
Implement and manage a secure system development life cycle (SDLC) program. Not yet, but planning to have in place.
Implement and manage a secure system development life cycle (SDLC) program. Don't have in place.
Implement and manage a secure system development life cycle (SDLC) program. Don't know.
Implement and manage a secure system development life cycle (SDLC) program.
Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response.
Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response. Have in place
Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response. Not yet, but planning to have in place.
Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response. Don't have in place.
Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response. Don't know.
Have an effective business resiliency program addressing business continuity, disaster recovery, and incident response.
Encrypt sensitive data, stored and in transit.
Encrypt sensitive data, stored and in transit. Have in place
Encrypt sensitive data, stored and in transit. Not yet, but planning to have in place.
Encrypt sensitive data, stored and in transit. Don't have in place.
Encrypt sensitive data, stored and in transit. Don't know.
Encrypt sensitive data, stored and in transit.
Implement strong technical controls in accordance with best security practices.
Implement strong technical controls in accordance with best security practices. Have in place
Implement strong technical controls in accordance with best security practices. Not yet, but planning to have in place.
Implement strong technical controls in accordance with best security practices. Don't have in place.
Implement strong technical controls in accordance with best security practices. Don't know.
Implement strong technical controls in accordance with best security practices.
Appropriately respond to any past cybersecurity incidents.
Appropriately respond to any past cybersecurity incidents. Have in place
Appropriately respond to any past cybersecurity incidents. Not yet, but planning to have in place.
Appropriately respond to any past cybersecurity incidents. Don't have in place.
Appropriately respond to any past cybersecurity incidents. Don't know.
Appropriately respond to any past cybersecurity incidents.