There are evaluation ranges lSO 27001. Which it is the range of application of ISO 27001? What are the ranges of evaluation?
Previous and current ISO 27001 and the risk management
Does it make sense to create a concept according ti ISO 27001 and combine it with BSI? (especially in the risk assessment and the implementation)?
The CISO
ISO 27001 DEFINITION OF SECURITY ROLES AND RESPONSIBILITIES. CLAUSE A.7.1.2 AND A.13.2.4
Corrective actions
Is it necessary to mention the root cause analysis in the corrective actions of an internal audit? whether there is clause in the standard requiring companies to document their KPIs?
IT audits and CISO
Good day, does the IT auditor audits the work of the information security officer?
Threats and vulnerabilities list
Hi i have a question concerning the Threats and Vulnerabilities list, what you have is simply examples or they cover all the aspects?
The best way to perform the internal audit
Currently we are doing our IT audits via Excel and we plan to replace Excel-based audits (Excel-List with all of the ISO 27001 chapters) via SharePoint (we would like to map/move the excel content to SharePoint tables). I am the opinion, that this is not the best way of doing IT audits according to ISO 27001. So I would like to know if there are better solutions?
Risk interviews and workshops
I have been reading the article on "risk assessment tips for smaller companies", again a very good article - very informative. In the article it refers to the risk assessment interview, do you have any examples of these interviews or scripts that could be used? Just to ensure we are asking the right questions and probing for the right information?
Impact and likelihood values
i have a query. we have putforth threat and vulnerbaility values in risk assessment. we have values before mitigation and after mitigation. which value remains constant after mitigation? isit threat value or impact value
Application risk assessment
Would you please help me to understand about application risk assessment?