What level of confidentiality is normally chosen for the Statement of Applicability? Internal use? Restricted? I guess only these two are relevant?!
ISO 27001 and third party data risk
I would like to know how ISO 27001 can be implemented to prevent third party data risk
Supplier evaluation
I would like to know if there is any template how to evaluate suppliers and guidelines for that?
PCI QSA certification and ISO 27001 LA course
Will this program (ISO 27001 LA course) satisfy the requirement for an auditor certification to pursue the PCI QSA certification?
ISO 27001 - Policy for permitted use / Policy for information transfer
I have a question about chapter 4 - "management of records relating to this document“ (inside the policy for permitted use).
Policy users
1 - Why are the users of the policy (Policy for information transfer) limited to organizational units for information and communication technology?
ISMS processes for personnel security
What are the processes involved in ISMS as a security personnel?
Risk assessment and treatment
Appreciate if you can clarify something for me;
SOC 2 and ISO 27001
XXXX is a principal in a devops company that was looking for some help on a SOC2 issue. I remember you are more of an ISO specialist, but perhaps there is some overlap?