This is an example of an information security governance model suitable for a medium-sized organisation. It is designed to protect corporate information – including both personal data and business-critical information.
Executive Management
Approves policies and NIS2-related security measures, allocates resources and priorities, and monitors implementation through quarterly reporting.
Chief Information Security Officer (CISO)
Maintains the Information Security Management System (ISMS) and the Statement of Applicability (SoA). Reports to executive management every six months with a focus on the risk landscape and security incidents. Also responsible for security awareness training.
IT Department
Implements technical controls such as access management, logging, and patching.
System Owners
Responsible for managing risk in the systems under their ownership.
All Employees
Expected to be familiar with and follow security policies and participate in awareness training.
The Information Security Forum meets every two months. The CISO organises and chairs the meeting. Participants include the CISO, IT, HR, and DPO. Executive management may be invited when necessary.
Risk assessments are approved by the CISO in collaboration with system owners. Yellow and green risks are accepted by the CISO; red risks require executive approval.
Security incidents are managed according to a contingency plan approved by executive management.
All policies and documentation are maintained in Wired Relations and include:
The contingency plan is printed and available with responsible individuals.
The staff awareness programme follows a schedule approved by management and is documented continuously.
Get stories like this straight to your inbox. From GDPR to cybersecurity – we’ll keep you informed on what’s shaping the digital future.