ISO 27001 Guide To Implementation

  Рет қаралды 41,690

Mango

Mango

Күн бұрын

Пікірлер: 18
@brunom12111
@brunom12111 3 жыл бұрын
Nice explanation! The best one i found so far
@Mangolive
@Mangolive 3 жыл бұрын
Glad it helped!
@Homebased_Official
@Homebased_Official 10 ай бұрын
Fantastic breakdown - the only thing I am still struggling with is the difference between Gap analysis and Risk assessment in ISo27001. I do know what they are theoretically . However, I watched another video that cited their own steps as - Senior management buyin, purchase Iso standard , carry out risk assessment, complete SOA and scope, Gap Analysis, which is the internal Audit , findings , senior management, Attestation , certification. And what ISo version is yours ? 2023? Cos I know the2013 version has 114 controls
@tulpapainting1718
@tulpapainting1718 2 жыл бұрын
Thank you very much for all of this. Are you able to provide a new link to the ISMS manual that you mention? The link in the description is broken.
@trentmurray2467
@trentmurray2467 Жыл бұрын
Hey, it seems the resources no longer exist. Are you able to provide an updated link to your current ISMS Manual? Thanks!
@leefogel5195
@leefogel5195 2 жыл бұрын
Thanks for compiling this. Very helpful.
@Mangolive
@Mangolive 2 жыл бұрын
Glad it was helpful!
@dmnick123ify
@dmnick123ify 2 жыл бұрын
Hello...thanks for your video. I am interested in learning how to implement ISO. Where can I take a course to be educated on ISO 27000? Perhaps an online course. Thx
@anuproy4166
@anuproy4166 2 жыл бұрын
I'm qualified ISMS lead auditor certified. I want to work with foreign company. can you give me an idea for that?
@dommikador6524
@dommikador6524 3 жыл бұрын
Great
@stinfluggle
@stinfluggle 3 жыл бұрын
A very helpful explanation, thank you
@Mangolive
@Mangolive 3 жыл бұрын
You are welcome Roland
@Rups78
@Rups78 2 жыл бұрын
One query, 7.0 support should come under “Plan” or under “Do”? Because support is an action after planning. I may be wrong but would love to hear different opinions on this pls.
@wintergreene795
@wintergreene795 Жыл бұрын
Support in this context regards to the support of the management and the enterprise on the ISO certification process. Hence it is under the Plan
@Rups78
@Rups78 Жыл бұрын
Thanks for clarifying. “Management Support” make sense, instead of “Support”
@Walruz1000
@Walruz1000 2 жыл бұрын
Out of interest, how would you apply the model of Asset Register --> Classification Register --> Risk Register to a monitor? As you mention prior to discussing this how you even included computer monitors, how do you quantify the output of a monitor to determine the classification? For some of these was there a default which meant there was no further work necessary?
@Mangolive
@Mangolive 2 жыл бұрын
Good question Paul. The inclusion of monitors was seen as a catch all for all IT items. So we included them purely to ensure we didn't miss anything. The output was nil so therefore very low on the classification. Thus no further work necessary other than being labelled and tracked. Cheers Craig
@Walruz1000
@Walruz1000 2 жыл бұрын
@@Mangolive Thank you for the reply! Could I ask one further question, to what level would you record threats? Would you go as far as wiretapping\eavesdropping of an internal network, and would you include threats such as denial of service, denial of wallet etc? Or.. would you be more specific and include the actual threat, so for example if it were a denial of service it might be caused by Malware X. To what level of detail would we be expected to go? Also, under the treatment of controls where you are performing the threat assessment, is there a name for that model? The models I have seen so far use a scoring matrix and put threats in categories based on values assigned to each and then they calculate the average. Is there a name for the method you have used? And how does the classification register relate to the information security register? I understand the values of secret, public etc, but on the following slide that value is not attributed to any of the items, but there is instead a "Risk Level", how would I get from the classification of secret to a Risk Level of high for example? A lot of questions I know but I have to undertake an assessment as part of my Msc (for a fictitious company) and I need to say which threat assessment model I have used and justify why.
ISO 27001: How We Got ISO 27001 Certified
30:34
risk3sixty
Рет қаралды 8 М.
Cybersecurity Frameworks 102 - What You Need to Know about ISO 27001 and NIST CSF
39:52
CCSI Contemporary Computer Services Inc
Рет қаралды 22 М.
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,7 МЛН
風船をキャッチしろ!🎈 Balloon catch Challenges
00:57
はじめしゃちょー(hajime)
Рет қаралды 101 МЛН
Introduction to ISO 27001 (Information Security Management)
1:10:43
ISO 27001 Basics: Everything You Need to Get Certified
43:38
risk3sixty
Рет қаралды 97 М.
Implementing ISO 27001 in an organization with Kavitha
49:32
Prabh Nair
Рет қаралды 35 М.
How to Implement ISO 27001:2022 Like a Pro - Step-by-Step Guide
1:39:18
INFOSEC TRAIN
Рет қаралды 1,9 М.
ISO 27001 Risk Assessment: The Ultimate Guide
16:50
URM Consulting
Рет қаралды 61 М.
Assessing compliance:  the ISO 27001 ISMS internal audit
57:24
IT Governance USA Inc.
Рет қаралды 45 М.
ISO 27001: How to Get ISO 27001 Certified (Top 10 Tips)
37:38
risk3sixty
Рет қаралды 3,1 М.
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,7 МЛН