In this book Dejan Kosutic, an author and experienced information security consultant, is giving away all his practical know-how on successful ISO 27001 implementation. No matter if you’re new or experienced in the field; this book gives you everything you will ever need to implement ISO 27001 on your own.
Author and experienced business continuity consultant Dejan Kosutic has written this book with one goal in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 22301. Without any stress, hassle or headaches.
9 Steps to Cybersecurity from expert Dejan Kosutic is a free eBook designed specifically to take you through all cybersecurity basics in an easy-to-understand and easy-to-digest format. You will learn how to plan cybersecurity implementation from top-level management perspective.
Don't know which option is best for your company's situation? You'll be happy to know that many options exist for ISO 27001 and ISO 22301 implementation: you could hire an outside consultant, you could try doing it alone, or you could do it yourself with expert help from industry professionals.
Conformio is a smart online tool for ISO compliance - implement and maintain ISO 9001, ISO 14001, or ISO 27001 in your company with ease. Streamline your team eﬀort with a single tool for managing documents, projects, and communication.
An ISO 27001 tool, like our free gap analysis tool, can help you see how much of ISO 27001 you have implemented so far – whether you are just getting started, or nearing the end of your journey. The simple question-and-answer format allows you to visualize which specific elements of a information security management system you’ve already implemented, and what you still need to do.
ISO 27001/ISO 22301 Implementation Duration Calculator
This calculator will help you estimate the time needed for your ISO 27001 or ISO 22301 implementation. Since these two standards are equally complex, the factors that influence the duration of both of these standards are similar, so this is why you can use this calculator for either of these standards.
Learn everything you need to know about ISO 27001, including all the requirements and best practices for compliance. This online course is made for beginners. No prior knowledge in information security and ISO standards is needed.
In this online course you’ll learn all the requirements and best practices of ISO 27001, but also how to perform an internal audit in your company. The course is made for beginners. No prior knowledge in information security and ISO standards is needed.
With our online consulting, you’ll feel as if the consultant is right next to you in your office:
We’ll schedule regular meetings with you via Skype or GoToMeeting.
We will tell you exactly where to start from, and which steps you need to take next.
We’ll explain to you what the pitfalls are and how to avoid them.
We’ll explain to you which documents are required and how to fill them in.
We’ll review all the documentation you have written and give you our comments on what needs to be improved.
We’ll explain to you what criteria the certification auditors will have, so that you can prepare yourself.
We’ll make sure you don’t forget anything.
We’ll lead you all the way from the launch of the project to the successful certification.
The cooperation with you has saved us considerable amount of internal resources (human resources in the first place), so our investment in your documentation and mentoring has paid off. Also, you have provided us with a good overview of what the auditor’s expectations would be and which areas are the most important, so we went through the certification well prepared and with no greater stress.
Our products are of best-in-class quality. With a proven performance record of successful implementations in more than 100 countries, our world-class customer support ensures success. Read more about the 27001Academy here.
100% Secure Online Billing
We use Secure Socket Layer (SSL) technology, the industry standard and among the best available today for secure online commerce transactions. All of your personal information, including credit card number, name, and address is encrypted so it cannot be read during transmission. You are protected by your credit card company in the case of a fraudulent transaction with any purchase.