-
Document control
We have started the work and we do have the following question: when talking about the control of documents in paragraph 3 and 4 (internal and external documents) does that mean the ISO process documents or all documents within the organisation. I.e. Invoices/quotations/mail/ etc?
-
Hybrid approach for risk assessment
Can we perform Hybrid approach (Service based & Asset based) risk assessment? Also, can we create the process /methodology document likewise?
-
ISO 27001 implementation case studies
Are there any case studies available where ISO 27001 has been implemented successfully
-
Policy content
"From BYOD Policy
-
Risk assessment report
I already had a question about chapter 3.3 inside the report on risk assessment and risk treatment a few weeks ago. It was about the final reports where you explained to me that it relates to risk assessment and risk treatment. But I still don’t know which documents are meant when it comes to these final reports and the exact time period when they were created. I have a period of time when I did the risk assessment and risk treatment. But the final reports I don’t know what’s meant with that. It would be great if you could help me with this.
-
Sizing an project team
In your experience how many people are needed to execute the project for an organization with 600 staff?
-
Can ISO 27001 and ISO 22301 be used together in a document?
In the document when we were reading through it, it said we can use it for either/or like either ISMS or BCMS. So my question is is it possible to use it for both and put the word AND between ISMS and business continuity management system?
-
Questions about documents
First question: I was wondering if Privacy Policy document is included with the ISO 27001/22301….or if it is only included with the EU GDPR. If only included with GDPR, can I use that privacy policy for all our ISMS/BCMS needs as well?
-
Sizing information security and cyber security team
Cúal debería ser el número de personas que conformen el equipo encargado de la gestión de la seguridad de la información y cuántos de ciberseguridad?
-
Risk assessment approach
I was reading this article from instructor located at this location…https://advisera.com/27001academy/blog/2016/04/04/iso-31010-what-to-use-instead-of-the-asset-based-approach-for-iso-27001-risk-identification/