Tag Archives: isms
-
-
La Gestión de Riesgos en las Tecnologías de la Información
Un análisis del proceso de Gestión de Riesgos de TI desde las perspectivas distintas de los estándares, las normas y las mejores prácticas de gestión de TI aplicables. Se revisa el enfoque de gestión de riesgos de TI descrito en ITSM/ITIL, ISO 20000, ISO 31000, ISO 27001, ISO 27005, ISO 22301 y COBIT. Vamos a […]
-
CompSuite – Information Security Risk Management Software Promo Video
CompSuite effectively reduces tedious information security risk management tasks. It keeps all your assets in a single platform, giving you a bird-eye-view of …
-
ISO/IEC 20000 Overview
Presented by Perry Johnson Registrars on March 21st, 2017.
-
QWERTY Security: ISMS Solution for Akurana University
Project: ISO 27001 compliance and certification for Akurana University. “This university plans to obtain ISO/IEC 27001 compliance OR certification against ISO/IEC 27001 for information security. You are hired to develop an information security program which is one of the requirements to obtain the ISO certification. You are required to make a presentation to the board […]
-
Batalas – What is ISO 27001?
Whiteboard Wednesday
-
ISMS Tool Introduction
Provensec’s cloud-based Easy ISMS Tool covers all steps you need to achive ISO 27001 certification. These include documents, online risk assessment and templates that are explained with appropriate user guidance. This helps you to accomplish continuous compliance with ISO 27001 security standard while saving both time and money.
-
#BestPracticeTV What YOU need to know about ISMS
(ISMS)#BestPracticeTV brings you up to date with all your Information Security Management Systems. Don’t miss out on all of this free info regarding #ISO27001 and how you can avoid data loss! Stay tuned. For more information on ISO27001, go to our website in the additional links below. We have developed training videos, with one on […]
-
Wirksames ISMS für KMU von Dr. M. Holthaus
ISSS Security Lunch Abstract: Ein ISMS (Informationssicherheitsmanagementsystem) basiert auf den standardisierten Anforderungen von ISO 27001 und den dazugehörigen Schutzmassnahmen gemäss ISO 27002. Der Bau eines ISMS gemäss den erwähnten Anforderungen und Massnahmen ist nicht für jede Unternehmung als Lösungsweg geeignet, da einerseits Ressourcen (Geld, Manpower) und Know-how im Bereich Informationssicherheit vorausgesetzt werden. Unternehmen können nach […]
-
Highlights of Cambridge Cyber Security 2013
On the 24th September IT Governance held a prestigious event in Cambridge ‘Cyber Security — Managing and Mitigating Risk’. The day comprised of a series of talks from cyber security experts who discussed the latest cyber threats, risks and solutions, including the new ISO27001: 2013 standard. You can find out more information about ISO27001:2013 here […]
-
Highlights of Cambridge Cyber Security 2013
On the 24th September IT Governance held a prestigious event in Cambridge ‘Cyber Security — Managing and Mitigating Risk’. The day comprised of a series of talks from cyber security experts who discussed the latest cyber threats, risks and solutions, including the new ISO27001: 2013 standard. You can find out more information about ISO27001:2013 here […]
-
Highlights of Cambridge Cyber Security 2013
On the 24th September IT Governance held a prestigious event in Cambridge ‘Cyber Security — Managing and Mitigating Risk’. The day comprised of a series of talks from cyber security experts who discussed the latest cyber threats, risks and solutions, including the new ISO27001: 2013 standard. You can find out more information about ISO27001:2013 here […]
Recent Comments