Antonio Segovia

/Antonio Segovia

About Antonio Segovia

This author has not yet filled in any details.
So far Antonio Segovia has created 17 blog entries.

How to use Scrum for the ISO 27001 implementation project

Scrum is a framework, based on the Agile method, mainly used in software development. Originally, it was developed for complex product development, and there are many companies in the world that currently use this framework for various projects. Due to...

By | März 27th, 2017|BSI, ISMS, ISMS (BSI, ISO 27001), ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use Scrum for the ISO 27001 implementation project

How to use Scrum for the ISO 27001 implementation project

Scrum is a framework, based on the Agile method, mainly used in software development. Originally, it was developed for complex product development, and there are many companies in the world that currently use this framework for various projects. Due to...

By | März 27th, 2017|BSI, ISMS, ISMS (BSI, ISO 27001), ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use Scrum for the ISO 27001 implementation project

How to manage the security of network services according to ISO 27001 A.13.1.2

Everybody knows that information is stored in information systems (workstations, laptops, smartphones, etc.), but to exchange the information via a network is necessary. Most of the information systems in this world are connected to the same main network – Internet – and, without this network, our society would look pretty ...

The post How to manage the security of network services according to ISO 27001 A.13.1.2 appeared first on 27001Academy.

By | Februar 13th, 2017|BSI, ISMS, ISMS (BSI, ISO 27001), ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to manage the security of network services according to ISO 27001 A.13.1.2

How ISO 27001 and ISO 27799 complement each other in health organizations

More and more hospitals are interested in protecting their patient information, but they see ISO 27001 as not being specific enough. Although it covers many general aspects about information security, you can integrate it with other standards to cover specific aspects – for example, ISO 27799 for the protection of personal ...

The post How ISO 27001 and ISO 27799 complement each other in health organizations appeared first on 27001Academy.

By | Juni 13th, 2016|Blog, BSI, Information security, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO 27799, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, personal health information, Risikomanagement, risks, threats, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How ISO 27001 and ISO 27799 complement each other in health organizations

How ISO 27001 and ISO 27799 complement each other in health organizations

More and more hospitals are interested in protecting their patient information, but they see ISO 27001 as not being specific enough. Although it covers many general aspects about information security, you can integrate it with other standards to cover specific aspects – for example, ISO 27799 for the protection of personal ...

The post How ISO 27001 and ISO 27799 complement each other in health organizations appeared first on 27001Academy.

By | Juni 13th, 2016|Blog, BSI, Information security, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO 27799, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, personal health information, Risikomanagement, risks, threats, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How ISO 27001 and ISO 27799 complement each other in health organizations

How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2

As I mentioned in my previous article How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1, having good solution software to protect the information security is not enough to protect your organization’s information; we must also set up physical security controls to protect the equipment. ...

The post How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2 appeared first on 27001Academy.

By | April 26th, 2016|Blog, BSI, disposal, ISMS, ISMS (BSI, ISO 27001), ISO 27001:2013, ISO27001, maintenance, Notfallmanagement, off-premises, Penetrationstest, Penetrationstests, removal, reuse, Risikomanagement, sitting, unattended, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2

How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2

As I mentioned in my previous article How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1, having good solution software to protect the information security is not enough to protect your organization’s information; we must also set up physical security controls to protect the equipment. ...

The post How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2 appeared first on 27001Academy.

By | April 26th, 2016|Blog, BSI, disposal, ISMS, ISMS (BSI, ISO 27001), ISO 27001:2013, ISO27001, maintenance, Notfallmanagement, off-premises, Penetrationstest, Penetrationstests, removal, reuse, Risikomanagement, sitting, unattended, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2

How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2

As I mentioned in my previous article How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1, having good solution software to protect the information security is not enough to protect your organization’s information; we must also set up physical security controls to protect the equipment. ...

The post How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2 appeared first on 27001Academy.

By | April 26th, 2016|Blog, BSI, disposal, ISMS, ISMS (BSI, ISO 27001), ISO 27001:2013, ISO27001, maintenance, Notfallmanagement, off-premises, Penetrationstest, Penetrationstests, removal, reuse, Risikomanagement, sitting, unattended, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 2

How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1

Most of the companies today have controls to protect themselves from malicious software (viruses, trojans, etc.), to prevent employees from accessing malicious sites (filtering addresses through proxy servers), or to encrypt information when it is sent/received through email. However, I often find companies that neglect the physical protection of equipment, ...

The post How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1 appeared first on 27001Academy.

By | April 18th, 2016|Blog, BSI, cabling security, clear desk policy, clear screen policy, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, supporting utilities, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1

How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1

Most of the companies today have controls to protect themselves from malicious software (viruses, trojans, etc.), to prevent employees from accessing malicious sites (filtering addresses through proxy servers), or to encrypt information when it is sent/received through email. However, I often find companies that neglect the physical protection of equipment, ...

The post How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1 appeared first on 27001Academy.

By | April 18th, 2016|Blog, BSI, cabling security, clear desk policy, clear screen policy, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, supporting utilities, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to implement equipment physical protection according to ISO 27001 A.11.2 – Part 1

Implementing restrictions on software installation using ISO 27001 control A.12.6.2

Currently, in all companies around the world, it is necessary to install software (operating systems, office applications, financial applications, applications development, etc.). But, in general, the installation of this software is not sufficiently controlled, which can lead to certain risks. ISO 27001:2013 can help these companies with the implementation of an Information ...

The post Implementing restrictions on software installation using ISO 27001 control A.12.6.2 appeared first on 27001Academy.

By | Februar 8th, 2016|A.12.6.2, applications, Blog, BSI, installation, inventory, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, repository, restrictions, restrictions on software installation, Risikomanagement, risks, software, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für Implementing restrictions on software installation using ISO 27001 control A.12.6.2

How to use penetration testing for ISO 27001 A.12.6.1

A famous historical hacker, Kevin Mitnick, said on one occasion: “I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we have always found a hole.” So, probably the question now on your mind is ...

The post How to use penetration testing for ISO 27001 A.12.6.1 appeared first on 27001Academy.

How to use penetration testing for ISO 27001 A.12.6.1

A famous historical hacker, Kevin Mitnick, said on one occasion: “I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we have always found a hole.” So, probably the question now on your mind is ...

The post How to use penetration testing for ISO 27001 A.12.6.1 appeared first on 27001Academy.

How to use the cryptography according to ISO 27001 control A.10

Today, information travels constantly from one part of the world to another through email, online transactions, USB flash drives, and external hard drives. Outside the facilities of the organization, the information is in many places, such as ISP servers, routers, switches, external suppliers, carries and more, before arriving at its ...

The post How to use the cryptography according to ISO 27001 control A.10 appeared first on 27001Academy.

By | Dezember 14th, 2015|Blog, BSI, confidential information, cryptographic controls, cryptographic keys, decrypt, encrypt, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use the cryptography according to ISO 27001 control A.10

How to use the cryptography according to ISO 27001 control A.10

Today, information travels constantly from one part of the world to another through email, online transactions, USB flash drives, and external hard drives. Outside the facilities of the organization, the information is in many places, such as ISP servers, routers, switches, external suppliers, carries and more, before arriving at its ...

The post How to use the cryptography according to ISO 27001 control A.10 appeared first on 27001Academy.

By | Dezember 14th, 2015|Blog, BSI, confidential information, cryptographic controls, cryptographic keys, decrypt, encrypt, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use the cryptography according to ISO 27001 control A.10