{"id":3996,"date":"2025-09-03T09:48:09","date_gmt":"2025-09-03T09:48:09","guid":{"rendered":"https:\/\/test30.gov.zw\/?page_id=3996"},"modified":"2025-09-05T08:17:19","modified_gmt":"2025-09-05T08:17:19","slug":"technology-security-and-governance","status":"publish","type":"page","link":"https:\/\/www.psc.gov.zw\/?page_id=3996","title":{"rendered":"Technology, Security and Governance"},"content":{"rendered":"<h3>Functions:<\/h3>\n<ul>\n<li>\n<p><strong>Cyber Security &amp; Risk Management:<\/strong>\u00a0Establish and enforce the enterprise security framework, including policies, controls (firewalls, IDS), and continuous threat management via audits, penetration testing, and risk assessments to protect data and systems.<\/p>\n<\/li>\n<li>\n<p><strong>ICT Governance &amp; Compliance:<\/strong>\u00a0Develop and implement governance frameworks to ensure strategic alignment, regulatory compliance (e.g., data protection laws), and accountability, monitored through KPIs and performance reporting.<\/p>\n<\/li>\n<li>\n<p><strong>Strategic Execution &amp; Partnership:<\/strong>\u00a0Lead the development of long-term ICT strategy, manage vendor and stakeholder relationships, and oversee incident response and business continuity planning.<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Functions: Cyber Security &amp; Risk Management:\u00a0Establish and enforce the enterprise security framework, including policies, controls (firewalls, IDS), and continuous threat management via audits, penetration testing, and risk assessments to protect data and systems. ICT Governance &amp; Compliance:\u00a0Develop and implement governance frameworks to ensure strategic alignment, regulatory compliance (e.g., data protection laws), and accountability, monitored through [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3996","page","type-page","status-publish","hentry"],"blocksy_meta":[],"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"Harold Matandare","author_link":"https:\/\/www.psc.gov.zw\/?author=4"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Functions: Cyber Security &amp; Risk Management:\u00a0Establish and enforce the enterprise security framework, including policies, controls (firewalls, IDS), and continuous threat management via audits, penetration testing, and risk assessments to protect data and systems. ICT Governance &amp; Compliance:\u00a0Develop and implement governance frameworks to ensure strategic alignment, regulatory compliance (e.g., data protection laws), and accountability, monitored through&hellip;","_links":{"self":[{"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=\/wp\/v2\/pages\/3996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3996"}],"version-history":[{"count":13,"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=\/wp\/v2\/pages\/3996\/revisions"}],"predecessor-version":[{"id":4558,"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=\/wp\/v2\/pages\/3996\/revisions\/4558"}],"wp:attachment":[{"href":"https:\/\/www.psc.gov.zw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}