Security controls

/Security controls

How to use NIST SP 800-53 for the implementation of ISO 27001 controls

In my previous article, How to use the NIST SP800 series of standards for ISO 27001 implementation, I made a description about the NIST SP800 series (documents describing computer security practices, published by the National Institute of Standards and Technology – NIST) and of some specific documents that can be ...

The post How to use NIST SP 800-53 for the implementation of ISO 27001 controls appeared first on 27001Academy.

By | Mai 10th, 2016|baseline, Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, NIST SP 800-53, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Security controls, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use NIST SP 800-53 for the implementation of ISO 27001 controls

How to use NIST SP 800-53 for the implementation of ISO 27001 controls

In my previous article, How to use the NIST SP800 series of standards for ISO 27001 implementation, I made a description about the NIST SP800 series (documents describing computer security practices, published by the National Institute of Standards and Technology – NIST) and of some specific documents that can be ...

The post How to use NIST SP 800-53 for the implementation of ISO 27001 controls appeared first on 27001Academy.

By | Mai 10th, 2016|baseline, Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, NIST SP 800-53, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Security controls, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use NIST SP 800-53 for the implementation of ISO 27001 controls

How to use the NIST SP800 series of standards for ISO 27001 implementation

Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of security issues, they are not exhaustive. Thus, ISO 27001 clauses 6.1.3 b) and c) note that an organization can go beyond the standard’s controls to set proper security levels, by ...

The post How to use the NIST SP800 series of standards for ISO 27001 implementation appeared first on 27001Academy.

By | Mai 2nd, 2016|Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, NIST SP 800, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Security controls, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use the NIST SP800 series of standards for ISO 27001 implementation

How to use the NIST SP800 series of standards for ISO 27001 implementation

Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of security issues, they are not exhaustive. Thus, ISO 27001 clauses 6.1.3 b) and c) note that an organization can go beyond the standard’s controls to set proper security levels, by ...

The post How to use the NIST SP800 series of standards for ISO 27001 implementation appeared first on 27001Academy.

By | Mai 2nd, 2016|Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, NIST SP 800, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Security controls, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to use the NIST SP800 series of standards for ISO 27001 implementation

ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS)

What do diverse situations like the Battle of Trafalgar (1805), the Cooley–Tukey FFT algorithm (1965), and the multi-sided market competition have in common? They are all examples of big or complex problems divided into smaller and more manageable pieces to reach a winning solution. This is a strategy called “Divide ...

The post ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS) appeared first on 27001Academy.

By | Oktober 19th, 2015|Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, project management, Risikomanagement, Security controls, Unternehmen, Veranstaltungen, WBS, Work Breakdown Structure, Zertifizierung & Audit|Kommentare deaktiviert für ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS)

ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS)

What do diverse situations like the Battle of Trafalgar (1805), the Cooley–Tukey FFT algorithm (1965), and the multi-sided market competition have in common? They are all examples of big or complex problems divided into smaller and more manageable pieces to reach a winning solution. This is a strategy called “Divide ...

The post ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS) appeared first on 27001Academy.

By | Oktober 19th, 2015|Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, project management, Risikomanagement, Security controls, Unternehmen, Veranstaltungen, WBS, Work Breakdown Structure, Zertifizierung & Audit|Kommentare deaktiviert für ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS)