dcsimg

IT Governance certified training now available in Amsterdam

IT Governance Europe is delighted to announce the launch of our latest classroom training courses in Amsterdam.   Starting in 2020, they offer attendees a structured learning path from foundation to advanced level, and enable IT, privacy and security practitioners to develop the skills needed to deliver best practice and compliance in organisations of all sizes.   Continual professional … [Read more...]

ISO 27001 qualifications: Lead Auditor or Lead Implementer?

If you’re new to ISO 27001, the international standard for information security management, you might be finding it difficult to choose a training course that suits your needs.  A problem many people have is deciding between a lead auditor and a lead implementer training course.  What’s the difference between the two? It really is as obvious as it sounds: an implementer implements an ISMS … [Read more...]

Protect your information assets with effective risk management

In today’s information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and entire economies. The protection of information and associated assets – information security – is therefore overtaking physical asset protection as a fundamental corporate governance responsibility. An … [Read more...]

ISO 27701: the new international standard for data privacy

There’s a new standard for data privacy – ISO 27701. It’s the first document in the ISO 27000 series dedicated to privacy, explaining how organisations can create a PIMS (privacy information management systems) and meet best practices outlined in regulations such as the GDPR (General Data Protection Regulation).  Its controls will be very familiar to those who have adopted ISO 27001, the … [Read more...]

A guide to implementing and auditing ISO 27001

Information is one of your organisation’s most valuable assets. The objectives of information security are to protect the confidentiality, integrity and availability of information. These basic elements of information security help to ensure that an organisation can protect against:  sensitive or confidential information being given away, leaked or otherwise exposed, both … [Read more...]

What is ISO 27001 and why should your organisation adopt it?

If you’re considering implementing ISO 27001, the international standard for information security, you’ve probably heard experts like us talk about the benefits.  But what exactly does the Standard do, and how does it help your organisation? This blog will answer both those questions.    What is ISO 27001?  ISO 27001 is the international standard that describes best practice for an ISMS … [Read more...]

How cyber insurance can help you manage information security risks

For years, organisations have been looking for ways to avoid the potentially catastrophic consequences of data breaches. They might have finally found the answer in the form of cyber insurance.  Like any insurance policy, cyber insurance helps cover the costs associated with relevant damages. This includes things like loss of productivity, assisting those affected by the breach and fixing … [Read more...]

ISO 27001 compliance might be easier than you think

Want to know how you can protect your organisation from cyber attacks and data breaches? Who doesn’t? That’s why you should take our ISO 27001 self-assessment questionnaire.  This five-minute survey asks you about your current defence measures and explains how you can align your practices with ISO 27001, the international standard for information security.   What does ISO 27001 do?  ISO … [Read more...]

A 9-step guide to implementing ISO 27001

As with many projects, the hardest part of implementing ISO 27001 tends to be knowing where to begin. The Standard, which describes best practice for an ISMS (information security management system ISMS), explains the requirements you need to meet, but it doesn’t show you how to implement them.   In this blog, we explain in nine steps exactly what you need to do to implement … [Read more...]

Why you should adopt ISO 27001

A version of this blog was originally published on 13 June 2018  With cyber attacks and data breaches on the rise, organisations are making information security a top priority. Many have chosen to tackle the risk with the help of an ISMS (information security management system).  An ISMS is a system of documents, technology and people-management processes that … [Read more...]