• (0)
    ISO-27001-ISO-22301-blog

    Tag: “information security policy”

    What should you write in your Information Security Policy according to ISO 27001?
    Content of an Information Security Policy is certainly one of the biggest myths related to ISO 27001 – very often...
    Content of an Information Security Policy is certainly one of the biggest myths related to ISO 27001 – very often the purpose of this document is misunderstood, and in many cases people tend to think...
    How detailed should the ISO 27001 documents be?
    When starting to write a policy or a procedure, you’re probably puzzled as to how lengthy it should be. And...
    When starting to write a policy or a procedure, you’re probably puzzled as to how lengthy it should be. And the truth is, ISO 27001 (as well as other ISO standards like ISO 20000, ISO 9001, ISO...
    Roles and responsibilities of top management in ISO 27001 and ISO 22301
    Did you know that, in most cases, failure to implement ISO 27001 or ISO 22301 was directly related to the...
    Did you know that, in most cases, failure to implement ISO 27001 or ISO 22301 was directly related to the fact that top management did not want to assume their responsibilities for information security /...
    One Information Security Policy, or several policies?
    Very often I see questions on various forums on how to develop an Information Security Policy. Quite frankly, I don’t...
    Very often I see questions on various forums on how to develop an Information Security Policy. Quite frankly, I don’t think it is a good idea to stuff all the security rules into a single...
    The documentation myth – Why the templates are not enough?
    I noticed that many people running ISO 27001 projects who have downloaded documentation templates think “I have the templates now...
    I noticed that many people running ISO 27001 projects who have downloaded documentation templates think “I have the templates now – the rest is easy. I’ll write a few documents, show them to auditor, and...
    Information security policy – how detailed should it be?
    Quite often I see information security policies written in too much detail, trying to cover everything from strategic objectives to...
    Quite often I see information security policies written in too much detail, trying to cover everything from strategic objectives to how many numerical digits a password should contain. The only problem with such policies is...