News & Resources

Top 10 Mistakes in implementing ISO 2700...

As an Internal External Auditor, conducting Certification Audits on various standards for the Certification Bodies (CB), I have seen and experienced a lot. Some...

ISO 27001 Information Security Managemen...

ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management syste...

Defining the scope and boundaries of the...

Scope is one of the most critical areas in any Management System. Scope needs to be understood and needs to be described to take the risk out of a wrong scope d...

ISO27001 2020 Cloud Security Report [ISC...

Companies continue to rapidly migrate workloads from datacenters to the cloud, utilizing new technologies such as serverless, containers, and machine learning t...

ISO 27001 Top 10 Mistakes in implementin...

As an Internal External Auditor, conducting Certification Audits on various standards for the Certification Bodies (CB), I have seen and experienced a lot....

Conducting Internal Context Analysis: A ...

In the realm of Information Security Management Systems (ISMS), the ability to understand and analyse the internal context of an organization is crucial....

Decoding Stakeholder Dynamics: A Compreh...

ISO/IEC 27001:2022, particularly Clause 4.2, emphasizes the importance of identifying and understanding the needs and expectations of interested parties....

Defining Boundaries: Crafting the Scope ...

ISO/IEC 27001:2022, specifically Clause 4.3, outlines the process for determining the scope of the ISMS. Establishing a well-defined scope for an Information Se...

Crafting an Effective ISMS Manual: A Gui...

ISO/IEC 27001:2022, particularly Clause 4.4, provides the requirements for establishing, implementing, maintaining, and continually improving an ISMS. An Inform...

Crafting an Effective ISMS Manual: A Gui...

An Information Security Management System (ISMS) manual serves as a foundational document that outlines the policies, procedures, and controls implemented by an...

Aligning the ISMS Policy: A Blueprint fo...

According to ISO/IEC 27001:2022, particularly Clause 5.2, the ISMS policy must align with the standard's requirements to effectively support the organization's ...

Defining Roles and Responsibilities in I...

In an Information Security Management System (ISMS), clearly defining and assigning roles, responsibilities, and authorities is crucial for effective implementa...

Get Directions