ISACA’s article on ISO 27001 implementation.
Planning for and Implementing ISO 27001
Charu Pelnekar, CISA, CISM, ACA, AICWA, BCOM, CISSP, CPA, MCSE, QSA
ISO/IEC 27001:2005 Information Technology— Security techniques—Information security management systems—Requirements is an information security management system (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).1, 2 The potential benefits3, 4 of implementing ISO 27001 and obtaining certification are numerous. Implementing ISO 27001 can enable enterprises to benchmark against competitors and to provide relevant information about IT security to vendors and customers, and it can enable management to demonstrate due diligence. It can foster efficient security cost management, compliance with laws and regulations, and a comfortable level of interoperability due to a common set of guidelines followed by the partner organization. It can improve IT information security system quality assurance (QA) and increase security awareness among employees, customers, vendors, etc., and it can increase IT and business alignment. It provides a process framework for IT security implementation and can also assist in determining the status of information security and the degree of compliance with security policies, directives and standards.
I’ve high regards about SANS as a brand training information security stuffs.
Met few of their senior folks during NASSCOM security summit in Mumbai.
can you please stop distributing ask bar alongwith Java ?
It’s intruding on our privacy..
Not only oracle, many reputed firms dont give a damn for end user privacy and distribute the browser bar, etc along with their suites.
Not sure who’s going to bell the cat, May be Privacy | Electronic Frontier Foundation ?
FixNix InfoSec Solution’s Safe Networking tips !
Nixers wishes a very happy New Year and a healthy, happy and successful 2013.
On this auspicious Pongal/Sankaranthi day, we’d like you to achieve more than you set out to, and be more successful than you deserve in the coming year!
At this joyous time of year, We wish you abundance, happiness, and peace in a new year filled with hope. Happy holidays!
Cyberstalking is a topic offlate being discussed widely.
Particularly there’re lot of women victims being harassed due to this.
How can we unleash the power of social media without somebody unknown stalks on us?
You’ll get to see tips, insights in this ‘Safe Networking’ campaign mails.
McAfee has introduced apps like Socialprotection so that we can limit control of the photos we upload in our profiles.
Keeping that aside there’re lot of security tips posted by facebook itself which everyone should keep track.
Do an personal audit of your personal facebook account often at regular intervals.
Twitter provides option to us to control who follows our tweets and control the further spreading of our 140 char thoughts
There’re tools from reputed security vendors like BitDefender for twitter security protection.
Need to keep a tab on the twitter attacks happen