ISO 27001 & 22301 - Expert Advice Community

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • USA laws and regulations related to ISO 27001

    I have a client applying for ISO 27001 recertification. As part of this process, they have asked me to create a list of relevant U.S. laws and regulations and advise them as whether they are applicable to their business, and if applicable what the requirements are. Do you have documentation that I can purchase that will assist me with that?
  • Corrective action process

    Am looking at the corrective action process.
  • Performing BIA and protecting privacy

    Our xxxxx has been hiring a consultant every two years to assist them in 'updating' our BIA. Our xxxxx department is using the xxxxx tool and our CIO reviews our Cyber Security self assessment and then there's me who is putting the finishing touches on our xxxxx tool. It is time to update our BIA and looking at a DIY tool to use going forward. Our CIO is interested in a consultant or firm to assist in mapping GLBA and Cyber Security to move toward certification. Looking to find a place to start and build a roadmap.
  • ISMS checklist

    I want to prepare a professional checklist for ISMS but I cant find the best way.
  • Scope and Policy Definition

    I'm a student and I have in my training ship a project about ISMS (information security management system). I found a problem to define my scope project and politic in the first Step PLAN I work with the best practice of ISO 27002 . If you have more information about can you help me please.
  • Asset owner

    I have a question about the ISO 27001 Risk Assessment: If all employees have a laptop, do they all have to be mentioned separately in the Risk Assessment Table? Or can I just put 'all employees' as asset owner?
  • Risks related to ID cards

    Could you please help me to know the risk if an employee forgets his/her Permanent ID card.
  • Information security policies

    Do you have an Information Security Policy that is not referencing ISMS and ISO 27001. We are not there yet and looking for something more generic for first time round
  • Templates content

    I would like to ask what is described in Documents? What should be done or also how it should be done? For example: Access Control Policy - is it proposed and described (technical way) how to implement the policy? Or Bring Your Own Device (BYOD) Policy - is it proposed what kind of technology to use? Disposal and Destruction Policy - how to implement?
  • Audit Objective

    I purchased the ISO 27001 Audit Toolkit and noticed that there is nothing about the Objective of the Audit in any of the documents. Please advice me where it is supposed to be added