ISO 27001 & 22301 - Expert Advice Community

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Implementing ISMS for systems with different cyber security risks

    We need to implement ISMS for both our business office systems & operational systems. For the operational systems we have a greater risk for Cyber Security. How do we have to implement ISMS for this, and what will be the difference or main focal point for cyber security?
  • ISO 27001 for an University

    Is 27001 sufficient to cover all security related concerns of an Examination Cell of a University ? Are there any more standards relevant/useful for such a scenario?
  • ISMS scope for a cloud provider

    My company is a cloud provider with Infrastructure as a service (IaaS) model. In simple terms we rent servers, networks and security appliances to our customers. We keep the hardware and underlying infrastructure running, and our customers upload their data to the servers and control who has access to it.
  • Training and awareness statements in the Information security policy

    In your information security policy template what do these two statements mean and how are they different?
  • Alternative options for treating unacceptable risks

    In the case of simple Risk assessment where Risk Score is computed by adding impact and likelihood, it may happen that (implemented or to-be-implemented) controls reduce the likelihood but not the impact. If the Risk score is above the acceptable level of risk, what actions could be taken please other than accepting the risk?
  • Monitoring and reporting for security metric?

    Can you explain what is monitoring and reporting for security metric?
  • Questions about ISO 22301/BS 25999 Toolkit

    I have read through the offering for ISO 22301/BS 25999 Toolkit. I have a few questions though.
  • Shredding CDs and USB memory sticks

    What can I do to shred CDs and USB. we have some good in store many things and we want to have a form to destroy the items which wasn't there any list in the store for it. I already applied iso 27001 based on my organisation need and your documents.
  • What kind of information is of external origin?

    My question is about Documents of external origin section in Procedure for document and record control document.
  • Disaster vs. Incident

    What is the different between incident and disaster? Can you give some examples for both of this?