No video

ISO 27001 Guide To Implementation

  Рет қаралды 40,132

Mango

Mango

Күн бұрын

Пікірлер: 18
@brunom12111
@brunom12111 3 жыл бұрын
Nice explanation! The best one i found so far
@Mangolive
@Mangolive 2 жыл бұрын
Glad it helped!
@Homebased_Official
@Homebased_Official 7 ай бұрын
Fantastic breakdown - the only thing I am still struggling with is the difference between Gap analysis and Risk assessment in ISo27001. I do know what they are theoretically . However, I watched another video that cited their own steps as - Senior management buyin, purchase Iso standard , carry out risk assessment, complete SOA and scope, Gap Analysis, which is the internal Audit , findings , senior management, Attestation , certification. And what ISo version is yours ? 2023? Cos I know the2013 version has 114 controls
@dommikador6524
@dommikador6524 3 жыл бұрын
Great
@leefogel5195
@leefogel5195 2 жыл бұрын
Thanks for compiling this. Very helpful.
@Mangolive
@Mangolive 2 жыл бұрын
Glad it was helpful!
@stinfluggle
@stinfluggle 3 жыл бұрын
A very helpful explanation, thank you
@Mangolive
@Mangolive 3 жыл бұрын
You are welcome Roland
@trentmurray2467
@trentmurray2467 Жыл бұрын
Hey, it seems the resources no longer exist. Are you able to provide an updated link to your current ISMS Manual? Thanks!
@tulpapainting1718
@tulpapainting1718 2 жыл бұрын
Thank you very much for all of this. Are you able to provide a new link to the ISMS manual that you mention? The link in the description is broken.
@dmnick123ify
@dmnick123ify 2 жыл бұрын
Hello...thanks for your video. I am interested in learning how to implement ISO. Where can I take a course to be educated on ISO 27000? Perhaps an online course. Thx
@anuproy4166
@anuproy4166 2 жыл бұрын
I'm qualified ISMS lead auditor certified. I want to work with foreign company. can you give me an idea for that?
@Walruz1000
@Walruz1000 2 жыл бұрын
Out of interest, how would you apply the model of Asset Register --> Classification Register --> Risk Register to a monitor? As you mention prior to discussing this how you even included computer monitors, how do you quantify the output of a monitor to determine the classification? For some of these was there a default which meant there was no further work necessary?
@Mangolive
@Mangolive 2 жыл бұрын
Good question Paul. The inclusion of monitors was seen as a catch all for all IT items. So we included them purely to ensure we didn't miss anything. The output was nil so therefore very low on the classification. Thus no further work necessary other than being labelled and tracked. Cheers Craig
@Walruz1000
@Walruz1000 2 жыл бұрын
@@Mangolive Thank you for the reply! Could I ask one further question, to what level would you record threats? Would you go as far as wiretapping\eavesdropping of an internal network, and would you include threats such as denial of service, denial of wallet etc? Or.. would you be more specific and include the actual threat, so for example if it were a denial of service it might be caused by Malware X. To what level of detail would we be expected to go? Also, under the treatment of controls where you are performing the threat assessment, is there a name for that model? The models I have seen so far use a scoring matrix and put threats in categories based on values assigned to each and then they calculate the average. Is there a name for the method you have used? And how does the classification register relate to the information security register? I understand the values of secret, public etc, but on the following slide that value is not attributed to any of the items, but there is instead a "Risk Level", how would I get from the classification of secret to a Risk Level of high for example? A lot of questions I know but I have to undertake an assessment as part of my Msc (for a fictitious company) and I need to say which threat assessment model I have used and justify why.
@Rups78
@Rups78 2 жыл бұрын
One query, 7.0 support should come under “Plan” or under “Do”? Because support is an action after planning. I may be wrong but would love to hear different opinions on this pls.
@wintergreene795
@wintergreene795 9 ай бұрын
Support in this context regards to the support of the management and the enterprise on the ISO certification process. Hence it is under the Plan
@Rups78
@Rups78 9 ай бұрын
Thanks for clarifying. “Management Support” make sense, instead of “Support”
ISO 27001 Basics: Everything You Need to Get Certified
43:38
risk3sixty
Рет қаралды 95 М.
When you discover a family secret
00:59
im_siowei
Рет қаралды 32 МЛН
Zombie Boy Saved My Life 💚
00:29
Alan Chikin Chow
Рет қаралды 34 МЛН
ISO 27001 Risk Assessment: The Ultimate Guide
16:50
URM Consulting
Рет қаралды 55 М.
Conducting an Information Security Risk Assessment
1:04:09
SecureTheVillage
Рет қаралды 39 М.
Introduction to ISO 27001 (Information Security Management)
1:10:43
ISMS implementation in any organization - ISO 27001
45:38
InfoSec4TC
Рет қаралды 26 М.
Assessing compliance:  the ISO 27001 ISMS internal audit
57:24
IT Governance USA Inc.
Рет қаралды 45 М.
When you discover a family secret
00:59
im_siowei
Рет қаралды 32 МЛН