Guest
How crucial is the creation and ongoing management of the Information Asset Register in obtaining ISO 27001 certification?
¿Cómo plantear y vender a nuestro cliente el proyecto para implementar ISO 27001?
Estamos en la ***
Con qué otras ISOs se podría complementar?
Dear Advisera Support Team
I have just purchased your "ISO 27001/ISO 22301 Risk Assessment Toolkit English" because I really find your concept practical according to the free downloadable materials on your website. Unfortunately after having looked through all the contents of the package, I am not fully satisfied with the purchase while expected more examples related to the asset-threat-vulnerability approach as written here in this site:
Diagram of ISO 27001:2013 Risk Assessment and Treatment process (advisera.com)
Could you please help me out? What I am looking for is more examples like this, something like a collection which ISO controls could address which threat and vulnerability types, a matching table would really help me. I would like to seek your support and advise here, especially when the assets would be infrastructure elements like a Domain Controller or a VPN gateway.
Thank you for this mail. I’m currently beginning redaction of the first documents and follow your online training. As I’m very satisfied of both , I’m also studying the opportunity to take a company account on advisera training for our employees awareness training.
After hours of reading and watching the very complete content of your website (blog, videos…) I don’t have any questions requiring a meeting, except one you could surely answer by email : what Is the best way to include “evidences” of policy implementation (screenshot, configurations … showing that a rule or control is implemented) ?
Once again, thank you very much for the quality of your service
I am an *** Branch of a Foreign entity doing business in ***, my foreign parent has taken iso certification. So by being the branch of this foreign entity do I have to apply for iso certification again in ***?
what's the meaning of Bomb attack and bomb threat? they mean logical bomb such as (DDOS,...)
Is an obligation define roles and responsabilities for TI in a Company with different Areas or Department? and that roles must be included in the Organizational Chart?