Guest
What are the more critical areas to prioritize focus during implementation?
What system/application you recommend to control documents, incidents and other stuff from ISO standards?
What KPIs will be the best to choose for monitoring metrics?
The question is: what is considered ‘business-relevant data’ as mentioned in the document ‘A.8.2 IT Security Policy’ and is there a list that we can use to help us identify instances of this?
1. What implementation issues do you usually have?
2. Do you have implementation shortcuts that helps you streamline an implementation?
1. What is the best methodology for an information security risk assessment?
2. How to ensure if privacy principles are dealt with in accordance with relevant legislation and regulations? If the client says that he is performing an assessment to ensure he is in line with the DPA, is this information enough to make him compliant with clause 18.1.4?
Asset Classification Best Practices
Advantages and disadvantages. Despite the popularity of ISO, how come some companies are still lacking the compliance culture, staffs are still not competent enough to follow the lay down procedures?
I’m trying to keep the risk assessment as simple as possible, would it work to group sensitive applications together rather than having them treated as separate assets? For example, rather than having: accounting software, bank payment apps, and ERP software as separate assets could we just group them into sensitive software? If possible I’d like to the same approach with things like admin accounts, user accounts, sensitive digital documents, and sensitive physical documents. In short, are we able to group assets that are alike?
Which of the two ISO 22301:2019 Lead Auditor Or Lead Implementer course is classed as the higher ranking course or are they equal in their own right?