{"id":78342,"date":"2023-03-15T13:54:34","date_gmt":"2023-03-15T13:54:34","guid":{"rendered":"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/?p=78122"},"modified":"2023-03-27T12:01:50","modified_gmt":"2023-03-27T12:01:50","slug":"governance-risk-and-compliance","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/","title":{"rendered":"Governance, Risk Management, and Compliance in the Cybersecurity Framework"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78342\" class=\"elementor elementor-78342\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6fe33e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6fe33e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f316d1c\" data-id=\"f316d1c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d677ebd elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"d677ebd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-desktop.jpg\" class=\"attachment-full size-full wp-image-78523\" alt=\"grc desktop\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-desktop.jpg 1024w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-desktop-300x153.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-desktop-768x391.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c801be elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"5c801be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"521\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg\" class=\"attachment-full size-full wp-image-78522\" alt=\"grc mob\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg 521w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob-300x300.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob-150x150.jpg 150w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a242ff8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a242ff8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d47524\" data-id=\"7d47524\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebd3546 elementor-widget elementor-widget-heading\" data-id=\"ebd3546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Governance, Risk Management, and Compliance in the Cybersecurity Framework<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-971c440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"971c440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dbc424\" data-id=\"1dbc424\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-690297b elementor-widget elementor-widget-post-info\" data-id=\"690297b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>March 15, 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"#author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tPriyanka Kulkarni Joshi\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45d48a4 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"\/cybersecurity-exchange\/disaster-recovery\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tDisaster Recovery\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98432b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98432b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6abf6b0\" data-id=\"6abf6b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6201be8 elementor-widget elementor-widget-text-editor\" data-id=\"6201be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGovernance, Risk Management, and Compliance (GRC) in the cybersecurity framework plays a vital role in cybersecurity planning and helps organizations mitigate risk to prevent future data breaches. While there are many existing frameworks widely accepted by companies such as the NIST cybersecurity framework, HIPAA, GDPR, SOC2, and FISMA, the GRC approach to improving cybersecurity includes processes such as the planning and administration of technologies that support the critical protection of assets. GRC focuses on 5 key areas such as risk treatment, policy development, governance and compliance, strategic planning, and vulnerability assessments.\n\nEvery industry is unique and data compliance is handled differently, which means most businesses can end up using more than one framework to meet their business requirements. GRC helps stakeholders review security controls that are put in place, perform internal and external audits, and set standards for sharing data with third-party solutions providers.\n\nCyberattacks may take various forms and utilize various technologies to breach a network or compromise assets, but the majority of data breaches occur due to lost, stolen, or mismanagement of credentials. GRC follows a holistic approach to cybersecurity and entails the utilization of all components through infrastructures, unifying enterprise risk management, governance, and compliance with the latest regulations. It identifies potential gaps in security processes and is excellent in providing comprehensive analytics to make remediation recommendations and give a complete overview of the organization\u2019s security posture.\n\nWhile cyberattacks may utilize various means and technologies to breach a network or compromise assets, data breaches occur majorly due to lost, stolen, or mismanagement of credentials.\n\nIn this whitepaper, we will be discussing how to implement the GRC framework effectively into your organization and establish security management structures. The cost of non-compliance is steep, and companies can save billions of dollars by ensuring a strong foundation. Companies often lack the capacity to assess their data security, and employees may become overly confident about their cyber preparedness due to the availability of security technologies. However, it is important to note that a significant part of compliance deals with ensuring that systems are properly configured and aligned with the latest regulatory requirements.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd2073b elementor-widget elementor-widget-image\" data-id=\"cd2073b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/benefits-of-using-grc-683x1024.jpg\" class=\"attachment-large size-large wp-image-78517\" alt=\"benefits-of-using-grc\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/benefits-of-using-grc-683x1024.jpg 683w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/benefits-of-using-grc-200x300.jpg 200w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/benefits-of-using-grc-768x1152.jpg 768w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/benefits-of-using-grc.jpg 1000w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75eb504 elementor-widget elementor-widget-text-editor\" data-id=\"75eb504\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWe will also cover the top compliance challenges when implementing the GRC framework, its benefits and limitations, and other relevant details to help you stay ahead of the curve. By the end of this whitepaper, you will have a strong understanding of GRC, its enablement procedures, how to develop GRC processes for your organization, and how to best integrate it with various Information Technology (IT) and Operation Technology (OT) frameworks. Read the entire whitepaper here.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Governance, Risk Management, and Compliance (GRC) in the cybersecurity framework plays a vital role in cybersecurity planning and helps organizations mitigate risk to prevent future data breaches. While there are many existing frameworks widely accepted by companies such as the NIST cybersecurity framework, HIPAA, GDPR, SOC2, and FISMA, the GRC approach to improving cybersecurity includes&hellip;<\/p>\n","protected":false},"author":43,"featured_media":78522,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12228],"tags":[12386,12387,12388,12389,12390,12391,12392,12393,12394,12395,12396,12306,12266],"class_list":{"0":"post-78342","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper","8":"tag-audit","9":"tag-compliance","10":"tag-compliancemanagement","11":"tag-corporategovernance","12":"tag-enterpriseriskmanagement","13":"tag-governance","14":"tag-grc","15":"tag-internalcontrols","16":"tag-legalcompliance","17":"tag-policymanagement","18":"tag-regulatorycompliance","19":"tag-riskassessment","20":"tag-riskmanagement"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Importance of Cyber Governance Risk management and Compliance in the Cybersecurity framework<\/title>\n<meta name=\"description\" content=\"Know how The GRC framework is useful in Cybersecurity risk management, and overall Cyber audits with the help of Cybersecurity compliance and governance\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Governance, Risk Management, and Compliance in the Cybersecurity Framework\" \/>\n<meta property=\"og:description\" content=\"Know how The GRC framework is useful in Cybersecurity risk management, and overall Cyber audits with the help of Cybersecurity compliance and governance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-15T13:54:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T12:01:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Priyanka Kulkarni Joshi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Priyanka Kulkarni Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/\"},\"author\":{\"name\":\"Priyanka Kulkarni Joshi\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/3e736e6e709f0b46d31c824f2de5a56d\"},\"headline\":\"Governance, Risk Management, and Compliance in the Cybersecurity Framework\",\"datePublished\":\"2023-03-15T13:54:34+00:00\",\"dateModified\":\"2023-03-27T12:01:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/\"},\"wordCount\":435,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/grc-mob.jpg\",\"keywords\":[\"Audit\",\"Compliance\",\"ComplianceManagement\",\"CorporateGovernance\",\"EnterpriseRiskManagement\",\"Governance\",\"GRC\",\"InternalControls\",\"LegalCompliance\",\"PolicyManagement\",\"RegulatoryCompliance\",\"RiskAssessment\",\"RiskManagement\"],\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/\",\"name\":\"Importance of Cyber Governance Risk management and Compliance in the Cybersecurity framework\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/grc-mob.jpg\",\"datePublished\":\"2023-03-15T13:54:34+00:00\",\"dateModified\":\"2023-03-27T12:01:50+00:00\",\"description\":\"Know how The GRC framework is useful in Cybersecurity risk management, and overall Cyber audits with the help of Cybersecurity compliance and governance\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/grc-mob.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/grc-mob.jpg\",\"width\":521,\"height\":521,\"caption\":\"grc mob\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/governance-risk-and-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/whitepaper\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance, Risk Management, and Compliance in the Cybersecurity Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/3e736e6e709f0b46d31c824f2de5a56d\",\"name\":\"Priyanka Kulkarni Joshi\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Importance of Cyber Governance Risk management and Compliance in the Cybersecurity framework","description":"Know how The GRC framework is useful in Cybersecurity risk management, and overall Cyber audits with the help of Cybersecurity compliance and governance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Governance, Risk Management, and Compliance in the Cybersecurity Framework","og_description":"Know how The GRC framework is useful in Cybersecurity risk management, and overall Cyber audits with the help of Cybersecurity compliance and governance","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-03-15T13:54:34+00:00","article_modified_time":"2023-03-27T12:01:50+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg","type":"image\/jpeg"}],"author":"Priyanka Kulkarni Joshi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Priyanka Kulkarni Joshi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/"},"author":{"name":"Priyanka Kulkarni Joshi","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/3e736e6e709f0b46d31c824f2de5a56d"},"headline":"Governance, Risk Management, and Compliance in the Cybersecurity Framework","datePublished":"2023-03-15T13:54:34+00:00","dateModified":"2023-03-27T12:01:50+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/"},"wordCount":435,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg","keywords":["Audit","Compliance","ComplianceManagement","CorporateGovernance","EnterpriseRiskManagement","Governance","GRC","InternalControls","LegalCompliance","PolicyManagement","RegulatoryCompliance","RiskAssessment","RiskManagement"],"articleSection":["Whitepaper"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/","name":"Importance of Cyber Governance Risk management and Compliance in the Cybersecurity framework","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg","datePublished":"2023-03-15T13:54:34+00:00","dateModified":"2023-03-27T12:01:50+00:00","description":"Know how The GRC framework is useful in Cybersecurity risk management, and overall Cyber audits with the help of Cybersecurity compliance and governance","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/grc-mob.jpg","width":521,"height":521,"caption":"grc mob"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/governance-risk-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Whitepaper","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/whitepaper\/"},{"@type":"ListItem","position":4,"name":"Governance, Risk Management, and Compliance in the Cybersecurity Framework"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/3e736e6e709f0b46d31c824f2de5a56d","name":"Priyanka Kulkarni Joshi"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78342"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78342\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78522"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=78342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=78342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}