ISO27001/ISO27002 a Pocket Guide - Second Edition

ISO27001/ISO27002 a Pocket Guide - Second Edition

ISO27001/ISO27002 a Pocket Guide - Second Edition

Alan Calder

18,21 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing Ltd
Año de edición:
2013
Materia
Gestión y técnicas de gestión
ISBN:
9781849285223
18,21 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Protect your organisation's information assets using ISO27001:2013 Information is one of your organisation's most important resources. Keeping that information secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it. Furthering the objectives of your organisation Information security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. For this reason, ISO27001 is not a one-size-fits-all solution, nor is it designed to be a static, fixed entity. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS. Creating an ISMS based on ISO27001/ISO27002 will help you to: •improve efficiency by having systems and procedures in place, enabling you to focus more on your core business; •protect your information assets from a wide range of cyber threats such as criminal activity and fraud, user errors, outside attack, insider compromise and system failure; •manage risk systematically and put in place a plan to eliminate or reduce cyber threats to your organisation; •prepare for the worst, as ISO27001 requires you to monitor information security events, enabling earlier detection of threats or processing errors, and faster resolution. Completely up to date with the latest 2013 release of ISO27001, ISO27001/ISO27002: A Pocket Guide covers: •The ISO/IEC 27000:2013 family of information security standards •Background to the standards certification process •The ISMS and ISO27001:2013 •Specification vs. Code of Practice •Documentation and Records •Management Responsibility •Policy and Scope •Risk Assessment •Implementation •Continual Improvement

Artículos relacionados

  • Cases on Management and Organizational Behavior in an Arab Context
    Khoury
    In the era of globalization and ease of international connectivity and business interactions, professionals from all over the world benefit from having a well-rounded view of business culture and organizational practice at the regional level. Cases on Management and Organizational Behavior in an Arab Context provides a presentation of teaching cases emphasizing the positive and...
  • Climate Change, Supply Chain Management and Enterprise Adaptation
    Costas P. Pappis / Costas PPappis
    Mounting scientific evidence shows that Earth’s climate is dramatically changing due to the greenhouse emissions caused by human activities, notably by burning fossil fuels for energy production and transport. Climate Change, Supply Chain Management and Enterprise Adaptation: Implications of Global Warming on the Economy aims to provide one among many diverse responses to a gro...
  • # BUSINESS SAVVY PM tweet Book01
    Cinda Voegtli
    Does your job require you to manage projects? If yes, wouldn’t you like to be described as a project manager who is a successful, influential and respected leader of important efforts in the organization? Now if that already sounds like you, great! But if not, what you need to get there is known as ’business savvy.’Business savvy does not mean a bagful of academic credentials, ...
    Disponible

    22,55 €

  • Advanced Topics in Global Information Management Volume 2
    Felix Tan
    ...
  • Managing Business with SAP
    Linda Lau
    ...
  • Advances in Electronic Business, Volume I
    ...

Otros libros del autor

  • Nine Steps to Success
    Alan Calder
    Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time.ISO/IEC 27001:2022 is the blueprint for managing information security in line with an organisation’s business, contractual and regulatory requirements, and its risk appetite. Nine Steps to Success has been updated to reflect the 2022 version of ISO 27001. This must-have guide from expert Ala...
  • Nine Steps to Success
    Alan Calder
    Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time.ISO/IEC 27001:2022 is the blueprint for managing information security in line with an organisation’s business, contractual and regulatory requirements, and its risk appetite. Nine Steps to Success has been updated to reflect the 2022 version of ISO 27001. This must-have guide from expert Ala...
    Disponible

    39,79 €

  • The EU Data Protection Code of Conduct for Cloud Service Providers
    Alan Calder
    The EU Data Protection Code of Conduct for Cloud Service Providers - A guide to complianceFormally founded in 2017, the EU Data Protection Code of Conduct for Cloud Service Providers (otherwise known as the EU Cloud Code of Conduct; the Code) is a voluntary code of conduct created specifically to support GDPR compliance within the B2B (business-to-business) Cloud industry. The ...
    Disponible

    17,82 €

  • ISO 22301
    Alan Calder
    Safeguard your organisation’s future with business continuity managementBusiness continuity - planning for, protecting against and ensuring recovery from disruptive events - is more important than ever.In an increasingly volatile world - exemplified by the COVID-19 pandemic - organisations are looking at business continuity from a fresh perspective. The illusion of business as ...
    Disponible

    49,25 €

  • The Ransomware Threat Landscape
    Alan Calder
    The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network.Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, whic...
    Disponible

    27,24 €

  • The Cyber Security Handbook
    Alan Calder
    In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.This boo...
    Disponible

    62,16 €