Show me desktop version

Checklist of mandatory documentation required by ISO 27001:2013

White paper that lists all the mandatory documents and records, but also briefly describes how to structure each document. This paper is ideal for all the companies that begin their ISMS implementation - it gives a perfect overview of which documents will be required, and where to place them.

DOWNLOAD

Diagram of ISO 27001:2013 Implementation

Diagram that shows the ISO 27001 implementation process, from the beginning of the project to the certification.

DOWNLOAD

ISO 27001 & ISO 22301 Documentation Tutorials

101-Introduction-thumb

How To Set Up ISO 27001 Project – Writing the Project Plan

Learn which steps you must take in your Information Security Management System implementation and how to fill in each element of the Project Plan.

ISBCA-VT-EN-101

free-calculator

ISO 27001 / ISO 22301 Implementation Duration
This calculator will help you estimate the time needed for your ISO 27001 or ISO 22301 implementation. Since these two standards are equally complex, the factors that influence the duration of both of these standards are similar, so this is why you can use this calculator for either of these standards.

Prepare your project

This step involves setting up your project and gathering all the necessary documents and information you’ll need. It’s okay if you don’t know where to start – Oscar will answer your questions for you, like:

  • What steps do you need to take in setting up your project?
  • What people and other resources will be required?
  • How much time will it take to implement?
  • Is there any way to make this easier, but still effective?
  • What do important stakeholders need to understand?
  • And much more…

Free ISO 27001 / ISO 22301 Consultation

We have ISO 27001 & ISO 22301 consultants ready to talk to you about where your organization is and what actions to take next. We know how complicated things can get, and we’re here to provide guidance you can rely on.

Find more information and support in our ISO 27001 & ISO 22301 Blog

How to perform an ISO 27001 second-party audit of an outsourced supplier

To focus on their core business, many organizations rely on outsourced suppliers to perform support processes. While this approach may bring benefits like costs savings, and access to expert knowledge and state-of-the-art technology, it can also involve risks related to loss of control over how these processes are performed and ...Read more

How can ISO 27001 and ISO 22301 help with critical infrastructure protection?

The European Council Directive 2008/114/EC of December 8, 2008, is a European Directive for the identification and designation of critical European infrastructures and the assessment of the need to improve their protection. It states: Critical infrastructure means an asset, system or part thereof … which is essential for the maintenance ...Read more

ISO 27001 vs. Cyber Essentials: Similarities and differences

In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection, but differences in resources and knowledge often result in data breaches because of the failure to implement basic security measures. To help handle such situations, the government in the United ...Read more

7 ways to improve the internal audits of your ISO 27001 ISMS

ISO 27001:2013 states that the purpose of the internal audit is to check compliance against both “the organization’s own requirements … and the requirements of this International Standard.” Aside from being a necessity of the standard, internal audits are important for several other reasons: Internal audits identify and rectify any ...Read more

How to gain employee buy-in when implementing cybersecurity according to ISO 27001

In the majority of organizations, change is embraced by senior management, but feared by employees. In the case of implementing ISO 27001, a committed senior management team (SMT) can understand clearly the benefits that an Information Security Management System (ISMS) will bring, such as decreased risk of business disruption, enhanced ...Read more

Which security clauses to use for supplier agreements?

Running a business on your own these days is practically impossible. Maintaining high levels of performance in every aspect of your business to stay competitive means draining precious resources that would be better invested in business growth and diversification. Thus, using suppliers becomes an attractive alternative. But, while suppliers are ...Read more

OUR CLIENTS

OUR PARTNERS

  • Exemplar Global (formerly RABQSA) is leading international authority in certification of training providers.
  • ITIL® is a registered trade mark of AXELOS Limited. Used under licence of AXELOS Limited. All rights reserved.
  • DNV GL Business Assurance is one of the leading providers of accredited management systems certification.
Request callback
Request callback

Or call us directly

International calls
+1 (646) 759 9933