Compliance ManagementPhoto by Anne Nygård on UnsplashPreviously in this series:The inputs of this cycle are:Certification Report (for the last period)Audit Report (for the last period)List of Requirements from Best Practices and Standards (for the last period)List of Requirements from Laws and Regulations (for the last period)Information Security Meeting Minutes (with investigation of reports and agreed actions) (for the last period)The outputs of this cycle are:Certification Report (for the last period)Audit Report (for the last period)List of Requirements from Best Practices and Standards (for the last period)List of Requirements from Laws and Regulations (for the last period)
A Journey to the Highest Cybersecurity Maturity: Compliance, Part 8 | by Vicente Aceituno Canal
