Example: Information Security Governance Model (Inspired by ISO 27001/NIS2)

This is an example of an information security governance model suitable for a medium-sized organisation. It is designed to protect corporate information – including both personal data and business-critical information.

Published: 
November 18, 2024
Jacob Høedt Larsen
PR & PA

Jacob Høedt Larsen, PR & PA at Wired Relations, is the host of Sustainable Compliance podcast and an expert on GRC workflows, supported by software, setting up a GRC program, managing a GRC team and securing management buy-in.

Read more from the author

Learn more:

1. Roles and Responsibilities

Executive Management
Approves policies and NIS2-related security measures, allocates resources and priorities, and monitors implementation through quarterly reporting.

Chief Information Security Officer (CISO)
Maintains the Information Security Management System (ISMS) and the Statement of Applicability (SoA). Reports to executive management every six months with a focus on the risk landscape and security incidents. Also responsible for security awareness training.

IT Department
Implements technical controls such as access management, logging, and patching.

System Owners
Responsible for managing risk in the systems under their ownership.

All Employees
Expected to be familiar with and follow security policies and participate in awareness training.

2. Organisation and Decision-Making

The Information Security Forum meets every two months. The CISO organises and chairs the meeting. Participants include the CISO, IT, HR, and DPO. Executive management may be invited when necessary.

Risk assessments are approved by the CISO in collaboration with system owners. Yellow and green risks are accepted by the CISO; red risks require executive approval.

Security incidents are managed according to a contingency plan approved by executive management.

3. Policies and Documentation

All policies and documentation are maintained in Wired Relations and include:

  • ISMS
  • SoA
  • Information Security Policy
  • System and supplier register

The contingency plan is printed and available with responsible individuals.

The staff awareness programme follows a schedule approved by management and is documented continuously.

4. Monitoring and Follow-Up

  • Annual review of risk assessments and controls
  • Contingency plan is tested annually
  • Annual management review

📰 Stay Ahead in GRC

Get stories like this straight to your inbox. From GDPR to cybersecurity – we’ll keep you informed on what’s shaping the digital future.

👉 Sign up for the newsletter