Please select user.Assign
There are no topics yet.
I was wondering what information security in project management means practically. I am thinking that information should be protected by ensuring least privileged access rights, physical access security, etc - would this be a correct analysis of this control please?
Hello. I am an IT Auditor on my previous job and currently i am a security compliance. I want to take CISA then after passing, i will take ISO 27001 Lead Auditor. Do you think this two certifications are good? or should I take ISO 27001 Lead Auditor certification only? I just want to hear comments from the expert. :) In addition, I want to focus my career path on audit but on the side of security.
can you please advise on what is involved in doing an integrated implementation of ISO/IEC 27001:2018, ISO 9001:2015 and ISO 22301:2012?
Quais são os niveis de segurança para se ter na empresa, tipo inicial, medio, avançado?
Estamos implantando a segurança da informação na empresa, e preciso saber e entender como funciona os niveis de segurança e o que preciso ter para alcançar cada nivel?
Consegue me ajudar com informação?
I need to craft out the BCP Framework following ISO22301 standard for critical IT systems, how do go about doing that?
I have an easy question for you. I am new to ISO anything. I like the way the framework is laid out. I have heard this framework (ISO 27000) is primarily used in Europe. I know ISO was started as a British standard, but is there a need to be a Certified ISO auditor in the US? Are American companies using or have to be certified under ISO? Since I live in the US, I am just wondering if it will help my career to take training and get certified.
How to install and what roadblocks they have experienced that delayed, or stopped, implementation
Hereby a question on how to write good risk statements using the known ISO risk component from 27005, Annex D (Threat, Vulnerability).
Various articles (e.g. ISACA) highlight a risk statement on the formula:
[Event that has an effect on objectives] caused by [cause/s] resulting in [consequence/s].
Can that in the ISO world be translated into:
Threat (that has an effect on objectives) caused by a vulnerability resulting in a business consequence. So taking 27005, Annex D, the first row in the table, the Risk Statement will be: There is a risk of "breach of information system maintainability" due to "insufficient maintenance installation of storage media." This may lead to XWY.
Or is it the other way round. That the risk is the "vulnerability"???
can i understand the common control between SAMA and ISO 27K
Please i want to know the specific requirements to achieve the A.11 domain of ISO27001 certification. My organization is considering becoming ISO certified