GDPR compliance for possible new start up business
how much will a short consultation be with you?
GDPR Article 27
Answer:
There is no such document in the Toolkit because setting up a company to act as your representative in the EU is subject to national Member State law.
Same if you want to have a representation/mandate contract with an existing company established in the EU, the contract will be subject to the rigours of the Member State law.
Lead implementer exam
The foundation course is very very short and I I will take the exam next week.
After that I would like to attend a classroom course for the Lead Implementer certification.
1- The question is: If I read your book, Am I able to pass the Lead Implementer exam without attending the course? I am a Security Architect, CISSP, CASP and Security+ certified with more than 5 years of Security Experience.
Answer: Our book provides you a good basis for the implementation process, but it is not possible to take a Lead Implementer exam without attending the Lead Implementer course (rule followed by accredited providers, the ones that can issue certifications world-wide recognized.)
2 - If not, do you advise any another book?
Answer: The material provided by accredited Lead Implementer courses are designed to be sufficient to take the exam, so there is no need for add itional material.
3 - Do you also advice me to attend the Internal Auditor course first? I am not happy at all that the book exists only in electronic format. I am trying to printing it somewhere.
Answer: Regarding our book, unfortunately we do not have a printed version at this time, but you can read the eBook on his computer, smart phone or tablet.
About the course, the internal auditor course is not needed for the Lead implementer course, but it might be useful if you intend to perform internal audits for your clients.
I am not sure if I should be defining in terms of HOW LIKELY each supplier may be to let us down in some way , or THE IMPACT of a supplier letting us down.
For example. FIRE; Likely hood of our fire alarm supplier letting us down is very low as they are a reputable supplier who do regular maintenance visits, but the IMPACT should a fire destroy our office would be very HIGH.
Similarly, With Firewall provider; likely hood of issue is low but impact would be very high. Which way do I need to look at each supplier in order to define risk?
Answer: The definition of risk is a combination of likelihood and probability, so you must consider both aspects in your risk assessment.
Since you stated you are using the scale low-medium-high, then possible combinations for likelihood vs. impact are low-low, high-high, low-high, high low.
Considering these combinations you may defined that for a result low-low the risk is acceptable and do nothing. For combination high-high the risk is unacceptable and security controls must be defined and implemented. As for combinations low-high and high-low you should check then in a case by case basis considering the identified impact to make a decision to treat or not the risk.
Answer: You can have both plans in a single document. In fact, because both systems, when based on ISO 27001 and ISO 22301, have a lot of common requirements, it is best to use a single document to coordinate the implementation.
Answer: You should consider for your ISMS all employees that have access to the information you want your ISMS to protect, so if all of your employees that work remotely in different states have access to these information, then all of them must be considered in the boundaries of your ISMS.
Answer: The point here is to explain about feelings and perceptions. If the persons involved in the analysis do not reach a consensus about the impact value for a specific situation, but they agree that the situation is significant enough to be taken into account together with situations for which they can determine the value, then you may have a situation where a non financial impact may be greater than any financial impacts they found related to other situations considered.
For example, in a plane crash situation, the value of the airplane can be determined, but what about the value of human lives? Someone may argue that he has a formula to calculate the value of a life, but the value may be questioned by relatives (which feelings may not be measurable), or employers (that may argue about the potential deli veries the professional would deliver to the company), making impossible to reach a consensus, but all of them would agree at certain point that the value of life is high.
Access control policy template content
A.9.2.5 Security of equipment off premises
Control
Security shall be applied to off-site equipment taking into account the different risks of working outside the organization’s premises.
I am not seeing the relationship there. Perhaps I'm missing an important point here. Can you lend me some guidance?
Answer: Sorry, but you are making a mistake here. ISO 27001:2013 control A.9.2.5 refers to "Review of user access rights" (Asset owners shall review users’ access rights at regular intervals). The control about "Security of e quipment and assets off-premises" is the A.11.2.6, which is not covered by this template (this control was A.9.2.5 in the ISO 27001:2005, which was withdraw when version 2013 was released). Here you can find the current version of the standard: https://www.iso.org/standard/54534.html
Answer: From your question I'll assume you are referring to the Statement of Applicability (SoA). Considering that, you have to evaluate if the SoA must be updated when there is a significant change in the ISMS scope or risk scenario, or at least during the management review, which normally is performed at least once a year. For controlling the SOA version you have to verify what is defined in your procedure for control of documents and records, because the SoA is a mandatory record for ISO 27001 certification.