Show me desktop version
DOWNLOAD

OWL

Diagram of ISO 22301 implementation process

Diagram that shows the ISO 22301 implementation process, from the beginning of the project to the certification.

DOWNLOAD

DOWNLOAD

OWL

Diagram of ISO 27001:2013 Implementation

Diagram that shows the ISO 27001 implementation process, from the beginning of the project to the certification.

DOWNLOAD

Begin the implementation

Okay, you know what you need to do. You’ve prepared, you’ve structured your plan, and the key stakeholders are on board. So what’s left? Implementation.

Remember that you are never on your own. At 27001Academy, we’ll make sure you have everything necessary:

Useful free content – Our blogs, articles, whitepapers and more provide  comprehensive instructions and support for ISO 27001 and ISO 22301 implementation.

Document templates – Choose from individual documents or full toolkits for ISO 27001 and/or ISO 22301. Get exactly what you need, with complete instructions for filling out each document.

Webinars – Our online, interactive training offers lots of valuable tips for beginning your implementation, performing the risk assessment, etc.

Document tutorials –Video tutorials go into further detail about how to fill in each template.

Access our resident experts, for free – Take advantage of our experts through online forums and free consultations. The answers to your questions are just a click or call away – and without the high price of a consultant.

Oscar is here for you, and he’s set to help you and your organization plan, structure and implement ISO 27001 and ISO 22301.

ISO27001-toolkit-box-EN

ISO22301-BS25999-toolkit-box-EN

Premium-documentation-toolkit-box-EN

 

Not sure what to do next? Speak to our consultants for free.

SCHEDULE FREE CONSULTATION

ISO 27001 & ISO 22301 Documentation Tutorials

Free Tutorial: How To Set Up ISO 27001 Project – Writing the Project Plan

Learn which steps you must take in your Information Security Management System implementation and how to fill in each element of the Project Plan.

27001-VT-EN-101

Documentation Tutorial: How to Define and Document the ISMS Scope According to ISO 27001

Learn which steps you must take when deciding on ISMS scope, and how to fill in each element of the Scope document.

27001-VT-EN-102

Documentation Tutorial: How to Write the ISO 27001 Risk Assessment Methodology

Learn the basics of information security risk analysis and how to develop the Risk Assessment Methodology.

27001-VT-EN-104

Documentation Tutorial: How to Write the Business Impact Analysis Methodology According to ISO 22301

Learn how to set the framework for defining your Recovery Time Objective (RTO), Recovery Point Objective (RPO), required resources, etc.

27001-VT-EN-114

Webinars

ISO 27001 benefits: How to obtain management support [free webinar]

Available as: Live webinar, Webinar on demand

Date: Wednesday - January 31, 2018

class="time-container ">Time: 11:00 AM (Convert to your time zone)

Webinar designed for professionals dealing with ISO 27001 implementation. The webinar explains how to get the top management interested in such a project, in order to obtain the necessary resources.


ISO 27001/ISO 22301: The certification process [free webinar]

Available as: Live webinar, Webinar on demand

Date: Wednesday - February 14, 2018

class="time-container ">Time: 8:00 AM (Convert to your time zone)

Webinar designed for organizations going for the ISO 27001 or ISO 22301 certification for the first time. The webinar explains the process of certification and gives tips on how to make the certification successful.


ISO 27001 & ISO 22301: Why is it better to implement them together? [free webinar]

Available as: Live webinar, Webinar on demand

Date: Wednesday - February 28, 2018

class="time-container ">Time: 11:00 AM (Convert to your time zone)

Webinar designed for companies implementing business continuity according to ISO 27001 A.17. The webinar explains how to use the ISO 22301 standard for that purpose.


Free ISO 27001 / ISO 22301 Consultation

We have ISO 27001 & ISO 22301 consultants ready to talk to you about where your organization is and what actions to take next. We know how complicated things can get, and we’re here to provide guidance you can rely on.

Find more information and support in our ISO 27001 & ISO 22301 Blog

How to apply information security controls in teleworking according to ISO 27001

Allowing employees to work away from the office, i.e., outside of the physical premises of the organization (otherwise known as “teleworking”) is becoming a common practice in the way to do business today. The ability to work remotely is seen as both a source of incentive for an employee’s productivity ...Read more

Should information security focus on asset protection, compliance, or corporate governance?

Traditionally, information security has been perceived as an activity that was built around protecting sensitive information assets – after all, this is what the first (2005) revision of ISO 27001, and its predecessor BS 7799-2, also emphasized. These standards required companies to identify all the assets, and then build the ...Read more

Qualitative vs. quantitative risk assessments in information security: Differences and similarities

In the risk assessment process, one common question asked by organizations is whether to go with a quantitative or a qualitative approach. The good news is that by using both approaches you can, in fact, improve your process efficiency towards achieving desired security levels. This article will present the concepts ...Read more

Business Continuity Management vs. Information Security vs. IT Disaster Recovery

For outsiders, it’s not easy to distinguish among the specific purposes of Business Continuity Management (BCM), Information Security (IS), and IT Disaster Recovery (IT DR). All three areas have something to do with “security,” “losses,” “disasters,” and “protection.” Read on to learn more about the particular roles of disciplines often ...Read more

Aligning information security with the strategic direction of a company according to ISO 27001

There is one requirement of ISO 27001 that is very rarely mentioned, and yet it is probably crucial for the long-term “survival” of an Information Security Management System (ISMS) in a company: this is the requirement from clause 5.1 that says that top management needs to ensure that the information security ...Read more

How to manage the security of network services according to ISO 27001 A.13.1.2

Everybody knows that information is stored in information systems (workstations, laptops, smartphones, etc.), but to exchange the information via a network is necessary. Most of the information systems in this world are connected to the same main network – Internet – and, without this network, our society would look pretty ...Read more
Request callback
Request callback

Or call us directly

International calls
+1 (646) 759 9933