0% found this document useful (0 votes)
183 views

Example Roles and Responsibilities Matrix

This document outlines the roles and responsibilities of key personnel in building an ISO 27001-compliant cybersecurity program, including the CEO, CIO, Security Director, network engineers, systems administrators, end users, and vendors/contractors. The CEO provides overall leadership and support, the CIO oversees the information systems environment, the Security Director develops and maintains the security program, and network/systems staff manage infrastructure. End users and third parties must adhere to security policies and procedures.

Uploaded by

Marcio Rodrigues
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views

Example Roles and Responsibilities Matrix

This document outlines the roles and responsibilities of key personnel in building an ISO 27001-compliant cybersecurity program, including the CEO, CIO, Security Director, network engineers, systems administrators, end users, and vendors/contractors. The CEO provides overall leadership and support, the CIO oversees the information systems environment, the Security Director develops and maintains the security program, and network/systems staff manage infrastructure. End users and third parties must adhere to security policies and procedures.

Uploaded by

Marcio Rodrigues
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Building an ISO 27001-Compliant Cybersecurity Program: Getting Started

with Marc Menninger

Role Responsibilities

CEO • Provides overall direction, guidance, leadership, and support for the entire organization
• Commits to implementing an information security management system (ISMS) and
providing the necessary support

CIO • Provides overall direction, guidance, leadership, and support for the entire information
systems environment
• Assists applicable personnel in their day-to-day operations
• Reports to other members of senior management on a regular basis regarding aspects
of the information systems posture

Security Director • Develops, implements, and maintains the information security program
• Ensures the ISMS complies with ISO 27001

Network Engineers • Plan, design, implement, document, operate, maintain, and optimize the organization’s
Systems Administrators network infrastructure
• Manage the organization’s network infrastructure and collaborate with other systems
engineers to maintain and optimize the network

End Users • Adhere to the organization’s information security policies, procedures, and practices
• Report instances of noncompliance to senior authorities
• Undertake day-to-day operations while also observing and reporting any issues that
could impede the safety and security of the organization’s system components

Vendors • Adhere to the organization’s information security policies, procedures, and practices
Contractors
Third Parties

Building an ISO 27001-Compliant Cybersecurity Program: Getting Started with Marc Menninger 1 of 1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy