Artwork

Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How to Use ISO 27001 to Manage Cyber Attacks

20:40
 
Share
 

Manage episode 334757838 series 3372790
Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome to the ISO Review Podcast
In this episode, Howard and Jim chat about How to Use ISO 27001 to Manage Cyber Attacks. Points that will be covered during this episode and then discussed further in subsequent episodes, include:

  • What does an ISMS look like?
  • What are the benefits of an ISMS?
  • What does an effective ‘implementation Plan’ look like? and
  • What Specific Guidance is available?

An Information Security Management System is the framework that helps organizations prepare for a cyber-attack through a process of threat assessment, monitoring and continual improvement.
A well-designed system requires that you identify potential sources of a security breach, mitigate them and provide a strong ongoing defense system for your information. An attack will happen – it’s not a case of ‘if’ it’s a matter of ‘when’.
It’s virtually impossible to predict every risk to your information and mitigate it. It is possible, however, to create and manage a system that will give you a fighting chance.
The key is preparation, detecting vulnerabilities and creating a more resilient management system, in terms of interactions with so many layers of cyber connections. That’s where an information security management systems (ISMS) fits into your future.
Deeper awareness about what does an ISMS looks like?

  • The harmonized structure of ISO 27001 integrates perfectly with other Harmonized Standards
  • Annex A requirements, if properly implemented, help keep your information assets safe
  • Audits (Internal and External) help you find ways to improve the effectiveness of your system to keep information secure

UPCOMING EVENT

Click here to register and attend a webinar hosted by The British Standards Institution (BSI),
How to use ISO 27001 to manage cyber attacks.
Date: Thursday July 28, 2022;
Time: 2:00PM - 3:00PM ET.
Click here to discover more information about the International Management System Institute on our website, and to sign up for our newsletter.
Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, any any other ISO requirements that you have to meet.
Click here to learn more about Management System Implementation Training Courses available at The Learning Alliance.
More about Jim on LinkedIn & YouTube
LinkedIn: https://www.linkedin.com/in/simplifyiso/

LinkedIn Articles: https://www.linkedin.com/in/simplifyiso/detail/recent-activity/posts/

YouTube: https://www.youtube.com/channel/UCrt2Hgj-5AjHKEvyf2ssZ8g

More about Howard

Click here to learning more about the Coaching and Podcast Services provided by Fox Coaching, inc.
LinkedIn: https://www.linkedin.com/in/foxcoachinginc/

  continue reading

45 episodes

Artwork
iconShare
 
Manage episode 334757838 series 3372790
Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome to the ISO Review Podcast
In this episode, Howard and Jim chat about How to Use ISO 27001 to Manage Cyber Attacks. Points that will be covered during this episode and then discussed further in subsequent episodes, include:

  • What does an ISMS look like?
  • What are the benefits of an ISMS?
  • What does an effective ‘implementation Plan’ look like? and
  • What Specific Guidance is available?

An Information Security Management System is the framework that helps organizations prepare for a cyber-attack through a process of threat assessment, monitoring and continual improvement.
A well-designed system requires that you identify potential sources of a security breach, mitigate them and provide a strong ongoing defense system for your information. An attack will happen – it’s not a case of ‘if’ it’s a matter of ‘when’.
It’s virtually impossible to predict every risk to your information and mitigate it. It is possible, however, to create and manage a system that will give you a fighting chance.
The key is preparation, detecting vulnerabilities and creating a more resilient management system, in terms of interactions with so many layers of cyber connections. That’s where an information security management systems (ISMS) fits into your future.
Deeper awareness about what does an ISMS looks like?

  • The harmonized structure of ISO 27001 integrates perfectly with other Harmonized Standards
  • Annex A requirements, if properly implemented, help keep your information assets safe
  • Audits (Internal and External) help you find ways to improve the effectiveness of your system to keep information secure

UPCOMING EVENT

Click here to register and attend a webinar hosted by The British Standards Institution (BSI),
How to use ISO 27001 to manage cyber attacks.
Date: Thursday July 28, 2022;
Time: 2:00PM - 3:00PM ET.
Click here to discover more information about the International Management System Institute on our website, and to sign up for our newsletter.
Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, any any other ISO requirements that you have to meet.
Click here to learn more about Management System Implementation Training Courses available at The Learning Alliance.
More about Jim on LinkedIn & YouTube
LinkedIn: https://www.linkedin.com/in/simplifyiso/

LinkedIn Articles: https://www.linkedin.com/in/simplifyiso/detail/recent-activity/posts/

YouTube: https://www.youtube.com/channel/UCrt2Hgj-5AjHKEvyf2ssZ8g

More about Howard

Click here to learning more about the Coaching and Podcast Services provided by Fox Coaching, inc.
LinkedIn: https://www.linkedin.com/in/foxcoachinginc/

  continue reading

45 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide