Artwork

Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.1.4 - 6.1.5.

29:05
 
Share
 

Manage episode 403370849 series 3372790
Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Howard and Jim chat about ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.1.4 - 6.1.5.
POINTS DISCUSSED

  1. How does the process of obtaining permission to access all areas and controls play into the effectiveness of an information security audit?
  2. Why is it crucial for auditors to create a review checklist, and what should typically be included in this checklist?
  3. In what ways do discussions with employees provide valuable insights into the efficacy of the information security management system?
  4. How do auditors provide "reasonable assurance" about the achievement of information security goals?
  5. How can organizations strike a balance between accepting a certain level of risk and ensuring adequate backup and protection to counter threats?
  6. What are some of the latest trends in risk-based approaches to information security that organizations need to stay abreast of?
  7. The importance of objective analysis and professional reporting during the audit, and what makes an auditor skilled in this aspect
  8. What are the main challenges when ensuring that all employees understand and follow the established policies and procedures?
  9. What resources and training should organizations prioritize to equip their teams for effective information security management?

LEARN MORE

Click here to try Conformance1's free online ISO 27001 Gap Checklist.
UPCOMING EPISODE
Howard and Jim Deep Dive into ISO/IEC TS 27008:2019 - Guidelines for the assessment of Information Security Controls - Clause 6.2, Resourcing and Competence.
NEXT STEPS
Please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.
Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.
Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.
Learn more about Jim on LinkedIn & YouTube
LinkedIn
LinkedIn Articles
YouTube
Book Recommendations:

Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet
The Checklist Manifesto: How to Get Things Right by Atul Gawande
Learn more about Howard
Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.
Keywords
ISO, ISO 27008, Information Security Management Systems, Risk Management, ISO Review Podcast
#ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ISOReviewPodcast
Note: As an Amazon Associate, we earn from qualifying purchases.

  continue reading

49 episodes

Artwork
iconShare
 
Manage episode 403370849 series 3372790
Content provided by Jim. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Howard and Jim chat about ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.1.4 - 6.1.5.
POINTS DISCUSSED

  1. How does the process of obtaining permission to access all areas and controls play into the effectiveness of an information security audit?
  2. Why is it crucial for auditors to create a review checklist, and what should typically be included in this checklist?
  3. In what ways do discussions with employees provide valuable insights into the efficacy of the information security management system?
  4. How do auditors provide "reasonable assurance" about the achievement of information security goals?
  5. How can organizations strike a balance between accepting a certain level of risk and ensuring adequate backup and protection to counter threats?
  6. What are some of the latest trends in risk-based approaches to information security that organizations need to stay abreast of?
  7. The importance of objective analysis and professional reporting during the audit, and what makes an auditor skilled in this aspect
  8. What are the main challenges when ensuring that all employees understand and follow the established policies and procedures?
  9. What resources and training should organizations prioritize to equip their teams for effective information security management?

LEARN MORE

Click here to try Conformance1's free online ISO 27001 Gap Checklist.
UPCOMING EPISODE
Howard and Jim Deep Dive into ISO/IEC TS 27008:2019 - Guidelines for the assessment of Information Security Controls - Clause 6.2, Resourcing and Competence.
NEXT STEPS
Please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.
Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.
Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.
Learn more about Jim on LinkedIn & YouTube
LinkedIn
LinkedIn Articles
YouTube
Book Recommendations:

Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet
The Checklist Manifesto: How to Get Things Right by Atul Gawande
Learn more about Howard
Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.
Keywords
ISO, ISO 27008, Information Security Management Systems, Risk Management, ISO Review Podcast
#ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ISOReviewPodcast
Note: As an Amazon Associate, we earn from qualifying purchases.

  continue reading

49 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide