Compliance Strategy & Management

Compliance Strategy & Management

Building effective Compliance Strategy and the establishment of Compliance Management Systems (CMS) bring great value to any organization that is operating in a highly regulated industry. Compliance requirements of different sources (laws & regulations, standards, industry mandates, internal policies and contractual obligations) need to be properly identified, evaluated, and assessed. Risks associated with non-compliance shall be evaluated, treated and brought to leadership attention. Over several years of experience assisting clients in establishing and maturing their compliance practices, it has been noticed that organizations that continue to underestimate the importance of compliance management and\or consider this a complementary exercise expose their environments to great risks. Compliance Management went into several transformations between the past, the present while yet to have more in the future with the adoption of advanced concepts, approaches, and science powered by machine learning and artificial intelligence. Coming soon is my new publication on the subject: “A Code of Practice for Compliance Management Using ISO37301:2021” – co-author Dr. Walid Al Ahmed – my teacher and great mentor. The publication has deep insights on the use of ISO27301:2021(1) in CMS for enterprise and cyber. It is the result of several years of hard work and experience in establishing compliance functions for several organizations in the region across different sectors.

No alt text provided for this image

(1) The diagram in this post is created with XMind(2022) only and only for demonstration purposes and not intended to publish partially or fully any part of the standard document. Original standard document available at ISO website (https://www.iso.org/home.html)

要查看或添加评论,请登录

BASSIL MOHAMMED的更多文章

  • Reflection on (CS)2AI — KPMG Control System Cyber Security Annual Report 2022

    Reflection on (CS)2AI — KPMG Control System Cyber Security Annual Report 2022

    I would like first to thank (CS)2AI and its partners for the effort, analysis and final report. Overall, the trends…

  • A Call for Internal/External Audit practices improvement- for Fraud Detection

    A Call for Internal/External Audit practices improvement- for Fraud Detection

    According to the “Report to the Nations - 2018 Global Study on Occupational Fraud & Abuse”, specifically on the “How is…

  • COBIT 5 Adoption & Recognition

    COBIT 5 Adoption & Recognition

    COBIT 5 Adoption & Recognition: In 2014, ISACA published a white paper describing the increasing adoption and…

  • IT Risk Management Code of Practice

    IT Risk Management Code of Practice

    "A Code of Practice for Effective Information Security Risk Management Using COBIT 5" is a new publication that we (Dr.…

    6 条评论
  • Clearing The Fog on COBIT 5

    Clearing The Fog on COBIT 5

    I receive several inquires on what COBIT 5 is best used for and how this framework can be customized to fit into…

    9 条评论
  • Where Should Information Security Report to?

    Where Should Information Security Report to?

    Information security governance ensures that all the structures, processes, roles and responsibilities related to…

  • IT Audit Benchmarking Survey

    IT Audit Benchmarking Survey

    ISACA recently published the annual “IT Audit Benchmarking Survey”. The survey is a global survey that covers IT Audit…

    4 条评论
  • Moments of Appreciation

    Moments of Appreciation

    My lovely 6th grade daughter is excited to participate in her school science fair competition this year. She asked me…

    1 条评论
  • SCADA Security Standards - NIST 800-82

    SCADA Security Standards - NIST 800-82

    Ref “SANS SCADA and Process Control Security Survey”, dated Feb, 2013 – the survey is very interesting and reflects the…

  • IAM

    IAM

    The Need for IAM: “A government agency researched the hard costs associated with identity administration across its…

社区洞察

其他会员也浏览了