Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Cyber Security And Cyber Resilience Policy
"Need a Cyber Security and Cyber Resilience Policy for a mid-sized fintech company that complies with both New York state regulations and federal requirements, with particular emphasis on cloud security and third-party vendor management to be implemented by March 2025."
1. Purpose and Scope: Defines the objectives and scope of the policy, including its applicability across the organization
2. Definitions: Key terms, technical concepts, and abbreviations used throughout the policy document
3. Roles and Responsibilities: Detailed outline of cybersecurity roles and responsibilities for different stakeholders
4. Risk Assessment Framework: Methodology and procedures for identifying, assessing, and managing cyber risks
5. Security Controls: Comprehensive technical and organizational measures for maintaining cybersecurity
6. Incident Response Plan: Procedures and protocols for detecting, reporting, and responding to security incidents
7. Compliance Requirements: Overview of regulatory compliance obligations and how they are met
8. Training and Awareness: Requirements for cybersecurity training and awareness programs
1. Cloud Security: Security controls and procedures specific to cloud service usage and management
2. IoT Security: Security measures and protocols for Internet of Things devices and networks
3. Remote Work Security: Security policies and procedures for remote work environments
4. Third-Party Risk Management: Procedures for managing cybersecurity risks associated with third-party vendors and partners
5. Data Classification: Framework for classifying data based on sensitivity and security requirements
1. Schedule A - Incident Response Procedures: Detailed step-by-step procedures for handling different types of security incidents
2. Schedule B - Security Control Matrix: Comprehensive matrix of security controls with implementation status and responsibilities
3. Schedule C - Risk Assessment Template: Standardized template and methodology for conducting risk assessments
4. Schedule D - Compliance Checklist: Detailed checklist of regulatory compliance requirements and status
5. Schedule E - Employee Security Guidelines: Detailed security guidelines and best practices for employees
6. Schedule F - Security Tools and Technologies: List of approved security tools, technologies, and their appropriate usage
Authors
Asset
Authentication
Authorization
Breach
Business Continuity
Cloud Computing
Confidential Information
Cyber Attack
Cyber Incident
Cyber Resilience
Cyber Risk
Cyber Security
Data Classification
Data Protection
Disaster Recovery
Encryption
Endpoint Security
Firewall
Incident Response
Information Security
Information System
Malware
Multi-Factor Authentication
Network Security
Password
Patch Management
Personal Data
Phishing
Protected Health Information
Ransomware
Risk Assessment
Security Controls
Security Event
Security Incident
Sensitive Data
System Administrator
Third-Party Vendor
Threat
User
Vulnerability
Zero-Day Exploit
Policy Statement
Governance and Oversight
Risk Management
Access Control
Data Protection
System Security
Network Security
Physical Security
Authentication and Authorization
Password Management
Encryption
Incident Response
Business Continuity
Disaster Recovery
Asset Management
Change Management
Third-Party Security
Cloud Security
Mobile Device Security
Remote Access
Training and Awareness
Compliance
Audit and Monitoring
Breach Notification
Data Classification
Acceptable Use
Social Media Security
Email Security
Patch Management
Vulnerability Management
Security Testing
Endpoint Protection
Data Retention and Disposal
Review and Updates
Enforcement
Exceptions
Find the exact document you need
Cyber Security And Cyber Resilience Policy
A U.S.-compliant policy document establishing organizational guidelines for cybersecurity protection and incident response.
Cyber Resilience Policy
A U.S.-compliant framework defining an organization's cyber threat preparedness and response procedures.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.