Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Policy Statement: High-level statement outlining the organization's commitment to cyber resilience and the policy's objectives
2. Scope and Applicability: Defines who and what is covered by the policy, including systems, data, and personnel
3. Definitions: Clear definitions of technical terms and key concepts used throughout the policy
4. Roles and Responsibilities: Detailed breakdown of responsibilities for all stakeholders, including management, IT staff, and general employees
5. Risk Assessment and Management: Framework for identifying, assessing, and managing cyber security risks
6. Security Controls and Requirements: Mandatory security measures and controls to be implemented across the organization
7. Access Control and Identity Management: Requirements for user authentication, authorization, and access management
8. Data Protection and Privacy: Measures for protecting sensitive data and ensuring compliance with privacy regulations
9. Incident Response: Procedures for detecting, reporting, and responding to cyber security incidents
10. Business Continuity and Disaster Recovery: Plans and procedures for maintaining operations during and after cyber incidents
11. Training and Awareness: Requirements for cyber security training and awareness programs
12. Compliance and Auditing: Procedures for monitoring and ensuring compliance with the policy
13. Policy Review and Updates: Process for regular review and updating of the policy
1. Third-Party Risk Management: Section for organizations that rely heavily on third-party vendors or service providers
2. Cloud Security: Specific requirements for organizations using cloud services
3. Remote Work Security: Guidelines for organizations with remote or hybrid work arrangements
4. Industry-Specific Requirements: Additional requirements for regulated industries (e.g., financial services, healthcare)
5. IoT Security: Guidelines for organizations using Internet of Things devices
6. Development Security: Requirements for organizations involved in software development
7. Physical Security Controls: Guidelines for physical security measures related to cyber resilience
1. Appendix A: Risk Assessment Template: Standard template for conducting cyber risk assessments
2. Appendix B: Incident Response Plan: Detailed procedures and contact information for incident response
3. Appendix C: Security Controls Checklist: Comprehensive list of required security controls and their implementation status
4. Appendix D: Acceptable Use Guidelines: Detailed guidelines for acceptable use of IT systems and resources
5. Appendix E: Data Classification Schema: Detailed criteria for classifying data and corresponding security requirements
6. Appendix F: Third-Party Security Requirements: Security requirements and assessment criteria for third-party vendors
7. Appendix G: Technical Standards: Specific technical requirements and configurations for systems and networks
Find the exact document you need
Cyber Resilience Policy
An internal policy document establishing cyber resilience requirements and procedures for organizations operating under Irish jurisdiction, aligned with national and EU regulations.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)