Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:

How to address main concerns with ISO 27001 implementation

Last week I delivered two webinars on the topic of ISO 27001, and I have asked the attendees to send me their top concerns regarding ISO 27001 implementation before those webinars.

I’ve summarized most common concerns into the following five areas – I’ve presented them in the webinars, and here is a more detailed explanation on how I feel they should be addressed:

1) The effort required to transition from the 2005 revision to 27001:2013

It is true that every company certified against the ISO 27001:2005 will have to transition to the 2013 revision within two years, and it is true that the 2013 revision has some new requirements, while some are gone. It is also true that this process won’t be finished in a couple of hours, but it certainly doesn’t have to be anything close to the effort of the initial implementation of the standard.

The key is in careful planning – if you know exactly which steps you need to take, you will reduce this transition effort to a minimum. With this in mind, read my article How to make a transition from ISO 27001 2005 revision to 2013 revision.

2) Successfully communicating a beneficial reason why a company should implement ISO 27001

The key is to determine benefits for the business side of the organization – benefits that are easily understandable and that bring clear value to the business, not to IT. Because, after all, the decision about ISO 27001 is not going to be made by the head of the IT department, but by your senior management.

In my view, there are four potential benefits that may be applicable to companies: (1) compliance, (2) marketing advantage, (3) decreasing costs, and (4) optimizing processes. Click here to read the details: Four key benefits of ISO 27001 implementation.

3) Setting up an appropriate and pragmatic risk assessment & treatment process

First of all, risk assessment and treatment cannot be performed by downloading some template you’ve found somewhere on the Internet, or by using the first tool you come across. Risk management needs to be done based on a risk assessment and treatment methodology that is adapted to the size of your company, various requirements, and the sensitivity of the information you have.

Too many times I’ve seen small companies using a risk assessment tool that is made for large corporations, only to realize they have spent six months performing work they could have finished in one month, and with questionable results. Therefore, before starting your risk management process, you need to find an appropriate methodology that will define how to identify the main elements of your risks (assets, threats and vulnerabilities) and which scales you will use to evaluate the consequence and the likelihood. Register for this free webinar for more information: The basics of risk assessment and treatment according to ISO 27001.

4) The resources required to maintain the certification

I’m afraid this concern shows one of the main myths about ISO 27001 – that the documents are written only for the purpose of certification. Let me give you an example – if you develop a Backup policy because you implement ISO 27001, will you require additional resources just because you are now complying with this policy? Or, what about if you performed backup normally before writing that policy, and now you want to make it clear to everyone how it is done?

My point is – you shouldn’t write the documents because of the auditor – you have to write them for yourself. And if you do so, there are no additional resources required because such rules become part of your daily routine; in some cases you will even have a smaller amount of work because some problems (i.e. security incidents) won’t happen again.

5) How much time will ISMS take me away from my main duties?

The answer to this question is very similar to that of the previous one, but I would add this – of course you will need someone who will coordinate all the information security effort in your company. But if you have, e.g. 50 employees, this will require perhaps a couple of hours of work per week, so this could be someone’s task in parallel to his or her normal job. Only when you pass the number of 1000 employees in a company should you consider a full-time CISO – but such an information security professional will probably save you so much money because of prevented incidents that such a move will certainly pay off.

Click here to register for a free webinar ISO 27001: An overview of ISMS implementation process.

Advisera Dejan Kosutic
Dejan Kosutic
Leading expert on cybersecurity & information security and the author of several books, articles, webinars, and courses. As a premier expert, Dejan founded Advisera to help small and medium businesses obtain the resources they need to become compliant with EU regulations and ISO standards. He believes that making complex frameworks easy to understand and simple to use creates a competitive advantage for Advisera's clients, and that AI technology is crucial for achieving this.

As an ISO 27001 and NIS 2 expert, Dejan helps companies find the best path to compliance by eliminating overhead and adapting the implementation to their size and industry specifics.
Connect with Dejan: