ExamGecko
Question list
Search
Search

Question 59 - Cybersecurity Audit discussion

Report
Export

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

A.
Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.
Answers
A.
Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.
B.
Review the most recent legal and regulatory audit report conducted by an independent party.
Answers
B.
Review the most recent legal and regulatory audit report conducted by an independent party.
C.
Determine if there is a formal process to review changes in legal and regulatory requirements. D Obtain a list of relevant legal and regulatory requirements.
Answers
C.
Determine if there is a formal process to review changes in legal and regulatory requirements. D Obtain a list of relevant legal and regulatory requirements.
Suggested answer: A

Explanation:

The FIRST thing that an IS auditor should do to ensure cyber security-related legal and regulatory requirements are followed by an organization is to determine if the cybersecurity program is mapped to relevant legal and regulatory requirements. This is because mapping the cybersecurity program to relevant legal and regulatory requirements helps to ensure that the organization has identified and addressed all the applicable laws and regulations that affect its cybersecurity posture, such as data protection, privacy, breach notification, etc. Mapping the cybersecurity program to relevant legal and regulatory requirements also helps to evaluate the alignment and compliance of the organization's cybersecurity policies, procedures, controls, and practices with the legal and regulatory requirements. The other options are not the first thing that an IS auditor should do to ensure cyber security-related legal and regulatory requirements are followed by an organization, but rather follow after determining if the cybersecurity program is mapped to relevant legal and regulatory requirements, such as reviewing the most recent legal and regulatory audit report (B), determining if there is a formal process to review changes in legal and regulatory requirements C, or obtaining a list of relevant legal and regulatory requirements (D).

asked 18/09/2024
Ian Lloyd
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first