The most common topics you can consider regarding lowering expenses are related to the impact of information security incidents: the decreasing of their quantity, of their effective impact, or on the resources involved in their handling.
Additionally, you can consider the decrease on fines related to non compliance with legal requirements.
Measurable quality objectives
Answer
If you write a quality objective that can be countable you ensure that it is measurable. For example:
* Our organization want to increase the number of corporate clients by 5% by the end of the year;
* Our organization want to reduce the number of clients lost to the competition by 7% by the end of the year;
* Our organization wants to reduce by 10% the customer wait time in line by the end of next quarter.
* Our organization wants to reduce employee turnover by 10% by the end of the year.
For each example you can count the number of corporate clients, the number of clients lost, …"
Answer
Surveillance audits are performed by certification bodies. Certification bodies use the same criteria that they have for certification audits. Normally, certification bodies try to keep one or more auditors from the certification audit in the following surveillance audits.
Answer:
Your question is not complete because we do not know your purpose, what aim you want to meet by enrolling in the course.
If you want to become an internal auditor, it is enough (and very expensive).
If you want to become an external lead auditor doing internal audits, it is enough (and very expensive).
If you want to become a lead auditor for a certification body, after the course when you get the certificate, you have to contact the certification body to know what their particular requirements are. They may want evidence of your experience as auditor, what your professional experience is because of the economic sectors that you can audit. Each certification body will have different requirements and different contract requirements.
Answer: The main difference between these three documents are:
- Risk Assessment and Risk Treatment Methodology Cloud covers not only requirements for ISO 27001, but also specific requirements applicable for cloud environments defined by ISO 27017 and for Personal Identifiable Information PII) defined by ISO 27018.
- Risk Assessment and Risk Treatment Methodology Premium covers not only requirements for ISO 27001, but also specific requirements applicable for business continuity defined by ISO 22301.
- Risk Assessment and Risk Treatment Methodology Integrated covers not only requirements for ISO 27001, but also specific requirements applicable for protection of personal data defined EU GDPR.
You can see the specific requirements covered in each document in its own section 2 - Reference Documents.
2 - Also, based on security practices risk is calculated by multiplying likelihood with im pact. However in this methodology you are adding them.
Answer: ISO 27001 does not prescribe how risk is calculated, and the most used practices are multiplying or adding likelihood with impact, and we chose for our template the last mentioned approach. However you can adjust the template approach for multiplying likelihood with impact if you wish so. This is perfectly acceptable by ISO 27001 requirements ( both methods are suggested in ISO 27005).
3 - Please let me know if Advisera has any documentation on how to perform risk assessments on third parties and cloud providers .
Answer: You can use the same risk assessment approach adopted by your organization to perform risk assessments on third parties and cloud providers. Please note that to assess risks on cloud providers you should consider the Risk Assessment and Risk Treatment Methodology Cloud.
Training on business continuity
I need an advice as to which Certification course can I first start to enroll with the academy.
I have looked at your prices compared to BCI, I have found them cheaper as I have to pay it myself
Answer: Since you mentioned BCI (Business Continuity Institute), I'm assuming you are looking for business continuity training. Considering that, unfortunately at this time we do not have available courses related to this topic. If you want to consider the ISO 22301, the ISO standard for business continuity, I'd suggest you first to take a foundations course to understand the standard and its requirements.
Answer
Changing parameters of an established product is not necessarily the outcome of design and development. If the company does not launch new products design and development is not applicable. But in our days it is difficult to stay in the market without periodically launch new products.
The best pathway will depend on your professional objectives. If you plan to work on an Information Security Management System certification process, then you should consider the Lead Implementer certification. If you plan to ensure the operation of an ISMS, then you should consider the Lead Auditor certification. Considering your current work, Lead Implementer certification seems more appropriated.
Your understanding about referencing risks on SoA is correct, but I'd like to comment that incorporating the Risk Assessment and Risk Treatment in a single spreadsheet is not a recommended approach. Although it may simplify documentation, it also creates a bigger document that is more difficult to read and work with, besides the fact that it leaves open information about risk treatment to personnel that only is required for risk assessment. For example, most people can participate in the risk assessment process, but definition of risk treatments and controls may be restricted only to personnel who will work on the implementation of such treatment. You should evaluate this situation to verify if using a single spreadsheet will not raise significant risk.
Information security in organizational chart
Answer:
Since your organization has a CRO (Chief Risk Officer), and I'm assuming that by that there is an organizational-wide risk management process, you have two options:
- Leave CRO in charge of the Information security risk management, and the CISO will provide the criteria by which information security risks will be evaluated considering the CRO risk management process approach.
- Leave CISO in charge of the Information security risk management, and the CRO will provide the requirements the information security risk management process will have to follow to stay compliant with the organizational-wide risk management process approach.