Information

Information Security Maturity Assessment

03/08/2022
Information
Information Security Maturity Assessment, Recommendations & Implementation Road Map as per CMA

Cyber Security threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the nation’s security, economy, and public safety and health at risk. Similar to financial and reputational risks, cybersecurity risk affects a company’s bottom line. It can drive up costs and affect revenue. It can harm an organization’s ability to innovate and to gain and maintain customers.

The MENA region has seen an increase in cyberattacks due to the adoption of digital technologies, such as the internet, IoT, and cloud, among others caused by economic diversification the recent years.

Information Security maturity assessments, risk mitigation plan, recommendation and implementation road map plan is very important based on the CMA guidelines to protect the Confidentiality, Integrity, and Availability of information and technology assets.

Capital Market Authority issued the circular no E/1/2022, to mandating the requirements to implement information security guidelines for public joint stock companies. The decision came on 5th January 2022

Public Joint Stock Companies shall amend their internal regulations and policies to be consistent with the information security guidelines maximum within (6) six months from the date of effect of this decision

Mnium Security Controls:

  • Access Control Policy
  • Information Security in Contracts
  • Password Management
  • Physical and Environment Security
  • Log Management
  • Personal Security
  • Data Privacy
  • Removable Media Protection
  • Cryptography
  • Incident Management
  • Data Hosting
  • Business Continuity and DR Plans

How can we help?

Crowe facilitate organization through its proven methodology as follows:

  • Current State Assessment (Gap Analysis)
  • Information Security Risk Profiling
  • Cyber Security Risk Profiling
  • Cyber Security Maturity Assessment
  • Recommendations and Roadmap
  • Set up PMO and CMA security guidelines Implementation

Crowe Information security health checkup leverages the CMA security guidelines recommendations by mapping to your organization’s current risk management processes and procedures to determine your current information security profile risk levels and recommendations. Thus, get your organization to comply with local regulatory requirements.