Practical steps to ensuring legislative and regulatory compliance and embedding the practices as business-as-usual in your organisation

  1. Legislative and Regulatory Landscape in RSA
  2. Cybersecurity Threats to Compliance
  3. Understanding your Business and its Compliance Regime
  4. Developing a Roadmap for the Implementation of the ICT Regulatory Framework
  5. Controls Selection – Statement of Applicability
  6. Criticality Assessment and Harm Reference Table
  7. Compliance Matrix in Policies, Standards and Procedures
  8. Compliance Certifications ( ISO 27001, PCI Data Security Standard, PCI Three Domain Security Standards (PCI 3DS), SWIFT Customer Security Controls Framework, SWIFT Provider Security Controls Framework )

August 23 @ 09:45
09:45 — 10:30 (45′)

Wayne Theron