LIVE VIRTUAL TRAININGS
Learn in small groups from top experts and real-life examples
  • (0)
    ISO-27001-ISO-22301-blog

    All posts by: Rhand Leal

    Using Intrusion Detection Systems and Honeypots to comply with ISO 27001 A.13.1.1 network controls
    Networks are what make collaborative work possible. Without them, remote or global business wouldn’t exist. This critical role attracts attention,...
    Networks are what make collaborative work possible. Without them, remote or global business wouldn’t exist. This critical role attracts attention, and makes networks a preferred target to wrongdoers, placing them in the security personnel’s top...
    How to manage network security according to ISO 27001 A.13.1
    As more and more people and organizations become interconnected, more and more information is exchanged, from that considered trivial and...
    As more and more people and organizations become interconnected, more and more information is exchanged, from that considered trivial and disposable to that most sensitive and necessary for people’s lives and business survival. That’s why...
    How to use NIST SP 800-53 for the implementation of ISO 27001 controls
    In my previous article, How to use the NIST SP800 series of standards for ISO 27001 implementation, I made a...
    In my previous article, How to use the NIST SP800 series of standards for ISO 27001 implementation, I made a description about the NIST SP800 series (documents describing computer security practices, published by the National...
    How to use the NIST SP800 series of standards for ISO 27001 implementation
    Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of...
    Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of security issues, they are not exhaustive. Thus, ISO 27001 clauses 6.1.3 b) and c) note...
    ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification
    One of the most significant changes in the 2013 version of ISO 27001, a worldwide standard for Information Security Management...
    One of the most significant changes in the 2013 version of ISO 27001, a worldwide standard for Information Security Management Systems, is that it does not prescribe any approach in the risk assessment anymore. While it...
    ISO 27001 Internal Auditor training – Is it good for my career?
    With business processes under constant pressure from management, customers, and other interested parties, to protect information exactly as requested, by...
    With business processes under constant pressure from management, customers, and other interested parties, to protect information exactly as requested, by means of technical specifications, legal requirements, or business objectives, and the greater complexity and sophistication...