Answer: If you are referring to our ISO 27001 foundation course, there is no need to buy additional material to take the exam. The information presented in the course will be sufficient to take the exam. But if you are considering another exam, or still consider acquiring more information before taking our exam, I suggest you to take a look at our book Book Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own https://advisera.com/books/secure-and-simple-a-small-business-guide-to-implementing-iso-27001-on-your-own/
This book contains an easy to follow structure for you to comprehend the ISO 27001 standard and implement it in an organization.
Obsolete equipment disposal
Answer: The most common difficulties regarding the proper disposal of obsolete equipment are:
1) make people aware of the importance of proper equipment disposal;
2) the need for space and access controls to store the equipment before they undergo the information sanitization procedures;
3) the control of information to ensure that no sensitive data is lost because users forgot to retrieve them from the equipment before sending them for disposal;
4) the disposal of equipment under BYOD terms.
Could you please let me know what type of document I should deliver to auditors? whether it is checklist which compare ISO27001 control with our policy or any other type of document?
Answer: I will assume that even though your organization is not ISO 27001 certified it considers relevant to follow its practices. Considering this, since ISO 27001 was updated on 2013, and organizational practices are based on 2005 version, your organization should present:
1) a management decision considering if it is still relevant to be aligned to ISO 27001 practices after the standard's update (this can be part of management review content)
2) if management has decided to maintain alignment, you also should provide a gap analysis between the organization's practices and the 2013 version o f ISO 27001, the management decision about how to proceed considering the gap analysis findings (e.g., what practices to update, what to keep and what to discontinue), and the action plans regarding the changes deemed relevant.
Answer: CISA is a certification issued by ISACA for persons who fulfills pre requisites related to audit of information systems, while ISO 27001 is a certifiable standard applicable to organization's Information Security Management Systems, but which also has a certification to recognize people capable to audit ISMS's compliant with this standard.
2 - if I have certificate of ISO27001LA and COBIT can it dispens of CISA.
Answer: This will depend of the type and depth of the activities you will perform. If your activity focuses on information security management, ISO 27001 LA would be sufficient. If you want to go a little deeper also considering IT governance activities and technical process, COBIT can help enhance your skills. CISA knowledge would help you perform audits that go beyond the scope of information security, also considering the strategic relationships of the information systems and business objectives.
3 - Who can I use ISO 27001 to audit my company step by step.
Answer: Business Continuity Management and Information Security overlap each other in several points and as business needs for stable and always available information systems grow, the need for professionals who can understand, explain and plan solutions which integrates these two fields will also grow, providing great opportunities for competent people. For more information, please see: Where does information security fit into a company? https://advisera.com/27001academy/blog/2016/10/24/where-does-information-security-fit-into-a-company/
Answer: This situation is related to the "drop down" function in Excel (defining the size of the list of options to show in the drop down list). To find alternatives to adjust the options in your vulnerability selection box, please type "drop down add item" in the search field of Tell Me What You Want To Do in your Excel Functions tab.
The quickest way to solve this situation for you is to include a new line in any part in the middle of the list of vulnerabilities and include your data. After doing that you can reclassify your list in alphabetical order to organize the list with no problem.
Dear/Sir
Hi
Thank you very much for your answering and trying to help me, but your answer still not yet enough up to my knowledge .
I went through your articles which covers only 3 standards out of 5 and understand the requirements of risk management for each standard, but the problem couldn't imagine the model of risk management process for all 5 standards together how looks like?, in another words how can we combine all of these risk requirements (5 standards) in one risk management process such as the one in ISO 31000?
I hope that you understand me now and did not disturb you or wast your your time
Thank you again and have a nice time
Kind regards
Nuri
Control mapping
Answer: Generally, people do not do something (e.g., map controls in risk treatment plan) either because they do not know that this should be done, or because they do not know how to do it. These would be your most probable causes, which can lead to the following root causes: in-existent or unclear risk assessment methodology, or a lack or inadequate training program.