Integrated Controls Management (ICM) - 8 Steps To Build A Secure & Compliant Cybersecurity & Privacy Program
Working with our friends at the Secure Controls Framework (SCF), we simplified the concept of "how to build a secure & compliant cybersecurity & privacy program" by developing the Integrated Controls Management (ICM) model. In the following downloadable diagram to demonstrate the unique nature of these components, as well as the dependencies that exist, so you can see for yourself the simple steps involved in building a scalable, secure approach to cybersecurity Governance, Risk & Compliance (GRC) management.
In simple terms, controls exist to protect an organization’s data. Requirements for asset management do not primarily exist to protect the inherent value of the asset, but the data it contains, since assets are merely data containers. Assets, such as laptops, servers and network infrastructure are commodities that can be easily replaced, but the data cannot. This concept of being data-centric is crucial to understand when developing, implementing and governing a cybersecurity and privacy program. In the seven steps listed in this approach, the guidance is focused on building secure processes so that compliance is a natural byproduct. This is an industry-agnostic approach that applies to any combination of compliance requirements your organization needs to address.