Answer: CISA is a certification issued by ISACA for persons who fulfills pre requisites related to audit of information systems, while ISO 27001 is a certifiable standard applicable to organization's Information Security Management Systems, but which also has a certification to recognize people capable to audit ISMS's compliant with this standard.
2 - if I have certificate of ISO27001LA and COBIT can it dispens of CISA.
Answer: This will depend of the type and depth of the activities you will perform. If your activity focuses on information security management, ISO 27001 LA would be sufficient. If you want to go a little deeper also considering IT governance activities and technical process, COBIT can help enhance your skills. CISA knowledge would help you perform audits that go beyond the scope of information security, also considering the strategic relationships of the information systems and business objectives.
3 - Who can I use ISO 27001 to audit my company step by step.
Answer: Business Continuity Management and Information Security overlap each other in several points and as business needs for stable and always available information systems grow, the need for professionals who can understand, explain and plan solutions which integrates these two fields will also grow, providing great opportunities for competent people. For more information, please see: Where does information security fit into a company? https://advisera.com/27001academy/blog/2016/10/24/where-does-information-security-fit-into-a-company/
Answer: This situation is related to the "drop down" function in Excel (defining the size of the list of options to show in the drop down list). To find alternatives to adjust the options in your vulnerability selection box, please type "drop down add item" in the search field of Tell Me What You Want To Do in your Excel Functions tab.
The quickest way to solve this situation for you is to include a new line in any part in the middle of the list of vulnerabilities and include your data. After doing that you can reclassify your list in alphabetical order to organize the list with no problem.
Dear/Sir
Hi
Thank you very much for your answering and trying to help me, but your answer still not yet enough up to my knowledge .
I went through your articles which covers only 3 standards out of 5 and understand the requirements of risk management for each standard, but the problem couldn't imagine the model of risk management process for all 5 standards together how looks like?, in another words how can we combine all of these risk requirements (5 standards) in one risk management process such as the one in ISO 31000?
I hope that you understand me now and did not disturb you or wast your your time
Thank you again and have a nice time
Kind regards
Nuri
Control mapping
Answer: Generally, people do not do something (e.g., map controls in risk treatment plan) either because they do not know that this should be done, or because they do not know how to do it. These would be your most probable causes, which can lead to the following root causes: in-existent or unclear risk assessment methodology, or a lack or inadequate training program.
Answer: NIST Cybersecurity Framework (NIST CSF) provides a policy framework for computer security, while ISO 27001 provides a framework for information protection. ISO 27001 uses a process approach and the PDCA cycle, while NIST CSF uses the approach Identify - Protect - Detect - Respond - Recover.
Since most information today flows in cyber environments, NIST CSF can be used to support many of the IT-related controls described in ISO 27001 Annex A. On the other hand, ISO 27001 management practices can help build, maintain and improve a cyber environment which relies on NIST CSF.
ISO 27001 Annex A controls mapping to products and solutions
Nonetheless, if you don't mind for me to ask, do you have a mapping for ISO 27001 (Annex A) to technical controls (such as all of the technical products and solutions); I think it is more on IT/IT Security/CyberSecurity technical controls.
Answer: Since technical implementation will depend on each organization's business and security requirements, the market of technical solutions changes very quickly, and combinations of technologies can result in different levels of security, building and maintaining such mapping is unpractical.
What I can orient you to do is identify first the main concepts your security solution needs, based on the recommendations of Annex A controls (these are not product/technology - oriented) and then contact you regular suppliers or the big players to see what they can offer you to cover you r needs. Regarding specific technologies, maybe you can find information on NIST Special Publications (https://csrc.nist.gov/publications/PubsSPs.html)
Answer: For a good project scope definition you should consider questions about:
- How many locations would be involved
- Which finalist processes should be covered by the ISMS
- How many people work on the processes, and if there are multiple shifts
- The expected time frame for implementing the ISMS
With this kind of information you can have an idea of the effort that will be needed for the project.