Show me desktop version
DOWNLOAD

OWL

Checklist of mandatory documentation required by ISO 27001:2013

White paper that lists all the mandatory documents and records, but also briefly describes how to structure each document. This paper is ideal for all the companies that begin their ISMS implementation - it gives a perfect overview of which documents will be required, and where to place them.

DOWNLOAD

DOWNLOAD

OWL

Diagram of ISO 27001:2013 Implementation

Diagram that shows the ISO 27001 implementation process, from the beginning of the project to the certification.

DOWNLOAD

ISO 27001 & ISO 22301 Documentation Tutorials

101-Introduction-thumb

How To Set Up ISO 27001 Project – Writing the Project Plan

Learn which steps you must take in your Information Security Management System implementation and how to fill in each element of the Project Plan.

ISBCA-VT-EN-101

free-calculator

ISO 27001 / ISO 22301 Implementation Duration
This calculator will help you estimate the time needed for your ISO 27001 or ISO 22301 implementation. Since these two standards are equally complex, the factors that influence the duration of both of these standards are similar, so this is why you can use this calculator for either of these standards.

Prepare your project

This step involves setting up your project and gathering all the necessary documents and information you’ll need. It’s okay if you don’t know where to start – Oscar will answer your questions for you, like:

  • What steps do you need to take in setting up your project?
  • What people and other resources will be required?
  • How much time will it take to implement?
  • Is there any way to make this easier, but still effective?
  • What do important stakeholders need to understand?
  • And much more…

Free ISO 27001 / ISO 22301 Consultation

We have ISO 27001 & ISO 22301 consultants ready to talk to you about where your organization is and what actions to take next. We know how complicated things can get, and we’re here to provide guidance you can rely on.

Find more information and support in our ISO 27001 & ISO 22301 Blog

How to use Scrum for the ISO 27001 implementation project

Scrum is a framework, based on the Agile method, mainly used in software development. Originally, it was developed for complex product development, and there are many companies in the world that currently use this framework for various projects. Due to the three basic pillars of Scrum (i.e., transparency, inspection, and ...Read more

How to apply information security controls in teleworking according to ISO 27001

Allowing employees to work away from the office, i.e., outside of the physical premises of the organization (otherwise known as “teleworking”) is becoming a common practice in the way to do business today. The ability to work remotely is seen as both a source of incentive for an employee’s productivity ...Read more

Should information security focus on asset protection, compliance, or corporate governance?

Traditionally, information security has been perceived as an activity that was built around protecting sensitive information assets – after all, this is what the first (2005) revision of ISO 27001, and its predecessor BS 7799-2, also emphasized. These standards required companies to identify all the assets, and then build the ...Read more

Qualitative vs. quantitative risk assessments in information security: Differences and similarities

In the risk assessment process, one common question asked by organizations is whether to go with a quantitative or a qualitative approach. The good news is that by using both approaches you can, in fact, improve your process efficiency towards achieving desired security levels. This article will present the concepts ...Read more

Business Continuity Management vs. Information Security vs. IT Disaster Recovery

For outsiders, it’s not easy to distinguish among the specific purposes of Business Continuity Management (BCM), Information Security (IS), and IT Disaster Recovery (IT DR). All three areas have something to do with “security,” “losses,” “disasters,” and “protection.” Read on to learn more about the particular roles of disciplines often ...Read more

Aligning information security with the strategic direction of a company according to ISO 27001

There is one requirement of ISO 27001 that is very rarely mentioned, and yet it is probably crucial for the long-term “survival” of an Information Security Management System (ISMS) in a company: this is the requirement from clause 5.1 that says that top management needs to ensure that the information security ...Read more
Request callback
Request callback

Or call us directly

International calls
+1 (646) 759 9933