Access Control | A security technique used to regulate who or what can view or use resources. |
Accountability | The obligation of an individual or organization to account for activities and accept responsibility. |
Adverse Selection | A market situation where asymmetric information leads to high-risk selections. |
Agile Governance | A flexible governance approach that adapts quickly to changes. |
AML (Anti-Money Laundering) | Laws, regulations, and procedures aimed at preventing financial crimes. |
Annual Risk Assessment | An annual evaluation of risks affecting an organization. |
Asset Management | The systematic process of managing an organization’s assets. |
Audit Committee | A governing body responsible for overseeing audit processes. |
Audit Log | A record of events related to system security and activities. |
Audit Trail | A chronological record of system activities for audit purposes. |
Authentication | The process of verifying user identity. |
Authorization | The process of granting or denying access to resources. |
Baseline Security | Minimum security requirements set as a standard. |
Benchmarking | Comparing organizational performance against industry standards. |
Board Oversight | Oversight function ensuring responsible decision-making. |
Business Continuity Plan (BCP) | A plan to ensure business operations continue after disruptions. |
Business Impact Analysis (BIA) | An analysis of potential disruptions and their business impact. |
BYOD (Bring Your Own Device) Policy | A policy for managing employee-owned devices in the workplace. |
CAPA (Corrective and Preventive Action) | A process to identify and correct deficiencies in operations. |
CISO (Chief Information Security Officer) | An executive responsible for cybersecurity and information security. |
Cloud Governance | Policies and practices for managing cloud computing risks. |
Compliance Audit | An examination of adherence to laws and regulations. |
Compliance Framework | A structure of rules ensuring compliance with laws and regulations. |
Compliance Risk | The potential for failing to comply with regulations. |
Confidentiality | Ensuring information is only accessible by authorized parties. |
Conflict of Interest | A situation where personal interests conflict with organizational duties. |
Continuous Monitoring | Ongoing evaluation of systems and activities for compliance. |
Control Deficiency | A weakness in an internal control system. |
Control Environment | The policies and procedures governing risk management. |
Control Self-Assessment (CSA) | A process for self-evaluating internal control effectiveness. |
Corporate Governance | The framework that governs corporate decision-making. |
COSO (Committee of Sponsoring Organizations) | A framework for internal controls and risk management. |
Crisis Management | Planning and responding to crises effectively. |
Cyber Risk | The potential harm resulting from cyber threats. |
Cybersecurity Framework | A structured approach to managing cybersecurity risks. |
Data Classification | The classification of data based on sensitivity levels. |
Data Governance | The process of managing data-related risks and policies. |
Data Leakage Prevention (DLP) | Security measures to prevent unauthorized data leaks. |
Data Privacy | Protecting personal data from unauthorized access. |
Data Protection | Safeguarding information through encryption and controls. |
Data Retention Policy | Policies defining how long data is retained. |
Digital Risk | The risk associated with digital transformation and automation. |
Disaster Recovery Plan (DRP) | A plan to restore operations after a disaster. |
Due Diligence | A thorough investigation before engaging in business relationships. |
Enterprise Risk Management (ERM) | A holistic approach to managing enterprise-wide risks. |
Ethical Hacking | Simulated cyberattacks to test security controls. |
Ethics Hotline | A reporting mechanism for unethical behavior. |
Event Logging | Recording system events for security and compliance. |
Exception Handling | Managing unexpected errors and exceptions in processes. |
Exit Strategy | A planned approach for discontinuing operations responsibly. |
External Audit | An independent review of financial and operational practices. |
Fair Dealing | Ensuring fair treatment of customers and stakeholders. |
FCPA (Foreign Corrupt Practices Act) | A law preventing corruption in business transactions. |
Financial Compliance | Compliance with financial laws and regulations. |
Financial Risk | Managing financial exposure and uncertainties. |
Fraud Prevention | Methods to detect and prevent fraudulent activities. |
GAP Analysis | Identifying gaps between current and desired states. |
GDPR (General Data Protection Regulation) | A European regulation for data protection and privacy. |
Governance Model | A structured approach to governance processes. |
Governance Risk | Risks related to governance structures and decisions. |
HIPAA (Health Insurance Portability and Accountability Act) | A US law ensuring medical data privacy. |
Identity and Access Management (IAM) | Managing access rights and user identities. |
Incident Management | Handling security incidents in an organization. |
Incident Response Plan (IRP) | A structured plan to respond to security incidents. |
Information Security Management System (ISMS) | A system for managing security risks systematically. |
Information Security Policy | A formal policy guiding security controls. |
Internal Audit | An internal function evaluating risks and controls. |
Internal Controls | Procedures ensuring operational integrity and accountability. |
IT Compliance | Ensuring IT systems comply with regulations. |
IT Governance | The system of rules governing IT management. |
IT Risk Management | Identifying and mitigating IT-related risks. |
Key Performance Indicators (KPIs) | Metrics for assessing business performance. |
Key Risk Indicators (KRIs) | Indicators measuring potential risks in operations. |
Legal Risk | Legal obligations and associated risks. |
Log Management | Processes managing system logs and activities. |
Loss Prevention | Strategies to prevent financial and security losses. |
Malware Protection | Protection against malicious software threats. |
Market Risk | Risks associated with market fluctuations. |
Material Weakness | A significant weakness in an internal control system. |
Mitigation Strategy | A strategy to reduce or eliminate risks. |
Monitoring Controls | Controls designed to continuously track risks. |
Multi-Factor Authentication (MFA) | Using multiple authentication factors for security. |
NDA (Non-Disclosure Agreement) | A legal contract ensuring confidentiality. |
Network Security | Protecting organizational networks from cyber threats. |
Operational Resilience | The ability to adapt to operational disruptions. |
Operational Risk | Risks related to daily business operations. |
Outsourcing Risk | Managing risks from outsourced services. |
Penetration Testing | Testing security defenses through simulated attacks. |
Personal Data Protection | Ensuring personal information remains secure. |
Phishing Awareness | Training employees on phishing risks. |
Policy Enforcement | Ensuring compliance with policies and procedures. |
Policy Management | Managing policies effectively across the organization. |
Privacy Impact Assessment (PIA) | Assessing privacy risks in processes. |
Process Automation | Automating compliance and risk management tasks. |
Ransomware Protection | Preventing and mitigating ransomware attacks. |
Regulatory Compliance | Ensuring adherence to regulatory requirements. |
Regulatory Reporting | Reporting regulatory compliance data to authorities. |
Residual Risk | The remaining risk after mitigation. |
Risk Acceptance | Accepting a level of risk within an organization. |
Risk Appetite | The amount of risk an organization is willing to take. |
Risk Assessment | Identifying potential risks before they occur. |
Risk Avoidance | Eliminating potential risks where possible. |
Risk Culture | The culture that influences risk management. |
Risk Governance | A governance approach to handling risks. |
Risk Identification | Detecting and identifying emerging risks. |
Risk Mitigation | Reducing or controlling risks effectively. |
Third-Party Risk Management | Assessing risks associated with third parties. |
Whistleblower Policy | A policy encouraging ethical reporting of issues. |