Cyber Governance

Ensure compliance and effective governance with features such as Security Compliance, Privacy Compliance, Governance and Management, Cloud Security Posture Management, and Asset Discovery and Management.

Privacy Compliance

Overview

The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Workplace, serves as a comprehensive tool for organizations to achieve compliance with international privacy standards, regulations, and frameworks.

Key Features:

User Manual

Navigating to Privacy Compliance Module

To navigate to the Privacy Compliance Module.


Adding Framework:






image.png



image.png



 

 

Dashboard Tab

 

image.png

image.png

Programs: This component shows what standards that you have added.

image.png

image.png

image.png


 

 

Manage Compliance Tab

In this tab you will see the frameworks that have been added.

image.png


Compliance Information Tab

In this tab, you can select a framework that you wish to adhere to.

Task Management Tab

The Task Management tab provides a comprehensive view of the compliance project, allowing users to track progress, and ensure that the project is on track to meet its objectives.

image.png

 

 


If you need further assistance, kindly contact our support at info@cytechint.com for prompt assistance and guidance.

Security Compliance

Overview

The Security Compliance Module is an essential component of our Software-as-a-Service (SaaS) CISO Workplace™, meticulously crafted to ensure organizational compliance with pertinent regulations, laws, and standards concerning data security. It facilitates the identification, evaluation, and management of information security risks while enforcing robust security measures to safeguard sensitive data.

Key Features:

User Manual

Navigating to Security Compliance Module

To navigate to the Security Compliance Module.


Adding a Framework:

 

image.png



maybe later.png

 

image.png

image.png

 

Manage Framework:


 

               * Click the icon next to the section number to reveal tasks.

               * Assign tasks by selecting an assignee from the dropdown list.

               * Update task status by selecting from the dropdown list.

               * The progress bar reflects the current status set in the “Status” column.

               * Sub-sections and their details are displayed on the right side.


image.png


image.png



image.png

image.png


image.png


image.png


 

Dashboard Tab

image.png

image.png

image.png

image.png

image.png

image.png

Manage Compliance Tab

In this tab you will see the frameworks that have been added.

image.png

 


Compliance Information Tab

In this tab, you can select a framework that you wish to adhere to.

image.png

Task Management Tab

The Task Management tab provides a comprehensive view of the compliance project, allowing users to track progress, and ensure that the project is on track to meet its objectives.

image.png


If you need further assistance, kindly contact our support at info@cytechint.com for prompt assistance and guidance.

Security Assessment Questionnaires

Overview

A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate the security posture of their vendors, partners, or internal departments. It typically consists of a structured set of questions designed to assess how well the entity adheres to security policies, controls, and best practices, including data protection, access management, incident response, and compliance with relevant regulations. The goal of an SAQ is to identify potential security risks, gaps, or vulnerabilities before entering into business partnerships or adopting new services, ensuring that sensitive information remains protected.


Navigate to the Module:


How to Add a Questionnaire:

In the Security Assessment Questionnaires, click on Create Template to add a questionnaire.

For demonstration purposes, we will be using a sample questionnaire to fill in information on the SAQ.

image.png


Add Questionnaire Title:

To edit the title, click on the image.png icon.

image.png

Once a title has been filled out, click on the saveimage.png icon to save any changes.


Add Questionnaire Section:

To add a section, first add a section title. Click on theimage.png icon to add a section title.

To save the section title, click add section.

image.png


Add Section Contents

For this example, we will add a sample question for the questionnaire.

To save the question in the section, click Add Question as shown in the figure above.

image.png

This will then save the question and will add another question form to be added by the user.


Add Multiple Sections:

To add multiple sections for a questionnaire, click on the section title

Type in the section title you want to add, then click the Add Section button.

The newly added section will be added to the table of contents and questions can be added to it.

image.png


How to Delete a Section:

If, for example, you accidentally create a section that you didn’t intend to, or if there is a typo when creating a section, you can easily remove it. Simply click the delete button next to the section, and it will be removed immediately. This allows you to quickly correct mistakes and maintain a clean, organized questionnaire.

In this example, a section called 'wasd' was created and we want to delete it. Simply click on the trash icon where the arrow is pointing to delete the section.


How to Save a Questionnaire:

Once all questions and sections of the questionnaire are complete, you can save your progress by clicking the green "Save" button, as shown in the figure above. This ensures all your changes are recorded and the questionnaire is ready for future use or distribution.

The newly created questionnaire will then be saved and shown on the Security Assessment Questionnaires Dashboard as shown above.


Types of Questions:

image.png

image.png

image.png

Conditional Questions:

For questions that have two parts, it's important to divide them into distinct sections for clarity and ease of response. As seen in the example below:

image.png

This method ensures that respondents are not overwhelmed by unnecessary fields unless their answer requires additional input. The main question gathers high-level information, while the follow-up captures detailed specifics only when relevant.

 

If you need further assistance, kindly contact our support at info@cytechint.com for prompt assistance and guidance.