An Introduction to Information Security and ISO 27001 by Steve G Watkins

By Steve G Watkins

Show description

Read Online or Download An Introduction to Information Security and ISO 27001 PDF

Similar project management books

Project manager's handbook : applying best practices across global industries

Realize How venture administration Is Used to release and deal with quite a few forms of initiatives during the commercial international venture Manager’s guide provides a wealth of targeted examples that convey how undertaking administration (PM) is used to release and deal with initiatives in lots of various industries all over the world.

Effective methods for software and systems integration

Earlier than software program engineering builds and installations should be carried out into software program and/or platforms integrations in army and aerospace courses, a entire realizing of the software program improvement lifestyles cycle is needed. masking all of the improvement existence cycle disciplines, powerful equipment for software program and platforms Integration explains find out how to decide upon and practice a existence cycle that promotes potent and effective software program and structures integration.

Improving Business Process Performance: Gain Agility, Create Value, and Achieve Success

The managerial practices that effectively drove for many years became inadequate to help the rapidly altering enterprise panorama. businesses round the world are being challenged to enhance functionality, reshape operations, and adapt rapidly to new possibilities. With an abundance of development methodologies and frameworks like BPM, BPI, Six Sigma, and Lean, many query the place to start.

Project Governance: Getting Investments Right

Offers crucial perception into what it takes to show an preliminary concept right into a venture with winning final result within the long-term. Fills a niche in present literature on venture administration and is carefully grounded within the most modern study during this box.

Additional info for An Introduction to Information Security and ISO 27001

Example text

This area of control includes the need to regularly test the business continuity plans (BCPs) in order to learn from the experience and improve the plans ahead of their being called upon for real. Of course, not all security incidents require such a dramatic response, but the degree of reaction and the method for determining escalation should be defined. 11 ISO27001 defines information security incidents and information security events separately. Not all events are, or will be, incidents, but both require management and this should be defined.

Occasionally there will be technological developments that introduce risks which are not covered to a suitable extent by the existing controls, and so it may be necessary to adopt additional controls. In the standards there are over 130 controls split into 11 categories, but for the purpose of familiarisation here we are considering them in six groups, and not in any detail. The six groups are not themselves significant and they could easily be formed differently. Organisation, structure and human resources This list includes the main controls off which the rest of the system hangs.

Aspx. These offer you essential, pertinent, expertly researched information on an increasing number of key issues. Training and Consultancy IT Governance also offers training and consultancy services across the entire spectrum of disciplines in the information governance arena. aspx. Why not contact us to see how we could help you and your organisation? Newsletter IT governance is one of the hottest topics in business today, not least because it is also the fastest moving, so what better way to keep up than by subscribing to ITG’s free monthly newsletter Sentinel?

Download PDF sample

Rated 4.27 of 5 – based on 21 votes