Expert Advice Community

Guest

Implementing regulatory requirements against cyber-threats

  Quote
Guest
Guest user Created:   May 17, 2019 Last commented:   May 17, 2019

Implementing regulatory requirements against cyber-threats

I am a student at University of Cape Town, studying Compliance Management short course. We have to discuss the topic Implementing regulatory requirements against cyber-threats. What are some of the key points I must focus on?
0 0

Assign topic to the user

ISO 27001 PROCEDURE FOR IDENTIFICATION OF REQUIREMENTS

Basics of identification of interested parties and their requirements.

ISO 27001 PROCEDURE FOR IDENTIFICATION OF REQUIREMENTS

Basics of identification of interested parties and their requirements.

Expert
Rhand Leal May 17, 2019

Answer:

When implementing regulatory requirements overall points you must focus on are:
- identification of which requirements you must comply to, so you can map requirements that must be fulfilled, related cyber-threats, and required controls (this will save you time, effort and costs).
- prioritization of requirements implementation, considering related cyber-threats, needed resources and impacts of non compliance.
- records you need to gather to evidence the requirements are fulfilled.

This article will provide you further explanation about controls implementation:
- 8 criteria to decide which ISO 27001 policies and procedures to write https://advisera.com/27001academy/blog/2014/07/28/8-criteria-to-decide-which-iso-27001-policies-and-procedures-to-write/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

May 17, 2019

May 17, 2019