Artwork

Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ISO/IEC TS 27008:2019: Clause 8.2.4 - Object-Related Procedures, and 8.2.5 - Previous Findings

27:14
 
Share
 

Manage episode 425523140 series 3372790
Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Howard and Jim chat about ISO/IEC TS 27008:2019 - Clause 8.2.4 - Object-Related Procedures, and 8.2.5 - Previous Findings

POINTS DISCUSSED

  1. How has the role of information security management systems evolved over time, and what key changes have occurred in the past few years?
  2. What are some specific methods organizations can use to review their information assets, and how do these methods ensure the verification of controls?
  3. How can an organization measure the effectiveness of its information security controls, and what steps should be taken if a control is found ineffective?
  4. Why is it necessary to review previous findings during an information security assessment, and how can this practice improve the overall security posture of an organization?
  5. How do changing conditions and emerging technologies impact information security assessments, and what measures can organizations take to keep their assessments relevant?
  6. In what scenarios might an organization benefit from using multiple review methods for assessing information assets, and how can these methods complement each other?
  7. What skills and knowledge are essential for information security auditors, and how can they stay updated on the latest developments in the field?

LEARN MORE

Click here to try Conformance1's free online ISO 27001 Gap Checklist.
UPCOMING EPISODES
Howard and Jim continue to deep dive into ISO/IEC TS 27008:2019 - Clause 8.2.6: Work Assignments; Clause 8.2.7: External Systems, Clause 8.2.8: Information Assets and Organization; and Clause 8.2.9: Extended Review Procedure
NEXT STEPS
Please follow us on your preferred podcast directory. We appreciate your likes & comments, and shares.
Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.
Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.
Learn more about Jim on LinkedIn & YouTube
LinkedIn
LinkedIn Articles
YouTube
Book Recommendations:

Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet
The Checklist Manifesto: How to Get Things Right by Atul Gawande
Learn more about Howard
Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.
Keywords
ISO 27001, Clause 8.2.4 - Object-Related Procedures, Clause 8.2.5 - Previous Findings, Information Security Management Systems, Risk Management, ISO Review Podcast, Jim Moran, Howard Fox
#ISO27001 #InformationSecurityManagementSystems #RiskManagement #Control Assessment Process, #ISOReviewPodcast

  continue reading

48 episodes

Artwork
iconShare
 
Manage episode 425523140 series 3372790
Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Howard and Jim chat about ISO/IEC TS 27008:2019 - Clause 8.2.4 - Object-Related Procedures, and 8.2.5 - Previous Findings

POINTS DISCUSSED

  1. How has the role of information security management systems evolved over time, and what key changes have occurred in the past few years?
  2. What are some specific methods organizations can use to review their information assets, and how do these methods ensure the verification of controls?
  3. How can an organization measure the effectiveness of its information security controls, and what steps should be taken if a control is found ineffective?
  4. Why is it necessary to review previous findings during an information security assessment, and how can this practice improve the overall security posture of an organization?
  5. How do changing conditions and emerging technologies impact information security assessments, and what measures can organizations take to keep their assessments relevant?
  6. In what scenarios might an organization benefit from using multiple review methods for assessing information assets, and how can these methods complement each other?
  7. What skills and knowledge are essential for information security auditors, and how can they stay updated on the latest developments in the field?

LEARN MORE

Click here to try Conformance1's free online ISO 27001 Gap Checklist.
UPCOMING EPISODES
Howard and Jim continue to deep dive into ISO/IEC TS 27008:2019 - Clause 8.2.6: Work Assignments; Clause 8.2.7: External Systems, Clause 8.2.8: Information Assets and Organization; and Clause 8.2.9: Extended Review Procedure
NEXT STEPS
Please follow us on your preferred podcast directory. We appreciate your likes & comments, and shares.
Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.
Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.
Learn more about Jim on LinkedIn & YouTube
LinkedIn
LinkedIn Articles
YouTube
Book Recommendations:

Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet
The Checklist Manifesto: How to Get Things Right by Atul Gawande
Learn more about Howard
Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.
Keywords
ISO 27001, Clause 8.2.4 - Object-Related Procedures, Clause 8.2.5 - Previous Findings, Information Security Management Systems, Risk Management, ISO Review Podcast, Jim Moran, Howard Fox
#ISO27001 #InformationSecurityManagementSystems #RiskManagement #Control Assessment Process, #ISOReviewPodcast

  continue reading

48 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide