Description
How to Achieve 27001 Certification
An Example of Applied Compliance Management
Authors: Arnason Sigurjon Thor, Willett Keith D.
Language: EnglishSubjects for How to Achieve 27001 Certification:
Keywords
Information Security; ISO Standard; Ism; Security Controls; Risk Treatment Plan; Pre-site Visit; Compliance Requirements; Information Security Management; Current Security Posture; Accredited Certification Body; CSIRT; Information Technology Security Techniques Code; Security Compliance Requirements; Ism Standard; Information Security Policy; Security Management Systems Requirements; Compliance Management Program; Information Security Standards; Compliance Management; Key Business Functions; PDCA Model; Ism Implementation; Compliance Assessment; Information Security Risk Management; Security Management Framework
117.69 €
Subject to availability at the publisher.
Add to cart the print on demand of Arnason Sigurjon Thor, Willett Keith D.Publication date: 12-2007
Support: Print on demand
71.13 €
In Print (Delivery period: 14 days).
Add to cart the book of Arnason Sigurjon Thor, Willett Keith D.Publication date: 09-2019
· 15.6x23.4 cm · Paperback
Description
/li>Contents
/li>Readership
/li>Biography
/li>
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process. Using security standards ISO 17799 and ISO 27001 as a basis, How to Achieve 27001 Certification: An Example of Applied Compliance Management helps an organization align its security and organizational goals so it can generate effective security, compliance, and management programs.
The authors offer insight from their own experiences, providing questions and answers to determine an organization's information security strengths and weaknesses with respect to the standard. They also present step-by-step information to help an organization plan an implementation, as well as prepare for certification and audit.
Security is no longer a luxury for an organization, it is a legislative mandate. A formal methodology that helps an organization define and execute an ISMS is essential in order to perform and prove due diligence in upholding stakeholder interests and legislative compliance. Providing a good starting point for novices, as well as finely tuned nuances for seasoned security professionals, this book is an invaluable resource for anyone involved with meeting an organization's security, certification, and compliance needs.