Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged information

Rss Feed Group items tagged

tech writer

ISO/IEC 27017 2015 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27017:2015 - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services. ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services Standard. Guidelines for information security controls applicable to the provision and use of Cloud services. Essential information for organizations that want to provide Cloud services that can be incorporated into an ISO 27001-compliant information security management system (ISMS). Useful for organizations evaluating the security posture of potential Cloud service providers. Available in hardcopy and PDF formats.
tech writer

Information Security A Practical Guide - Bridging the gap between IT and management | I... - 0 views

  •  
    Provides an overview of basic information security practices that will enable your security team to better engage with their peers in to address the threats facing the organization as a whole. Information security a practical guide provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organization as a whole. If you're starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know.
tech writer

ISO/IEC 27701 2019 Standard | IT Governance UK - 0 views

  •  
    Develop a privacy information management system as an extension to your ISO 27001-conformant ISMS with ISO/IEC 27701. Supports GDPR compliance. ISO/IEC 27701:2019 - Security techniques - Extension to ISO/IEC 27001 and ISO 27002 for privacy information management - requirements and guidelines Standard. ISO/IEC 27701 is the international standard that serves as an extension to an ISO 27001/ ISO 27002 ISMS (information security management system). It provides guidelines for implementing, maintaining, and continually improving a PIMS (privacy information management system).
tech writer

ISO 27001 ISMS & ISO 27701 PIMS Lead Implementer Course | IT Governance UK - 0 views

  •  
    Certified ISO 27001 ISMS and ISO 27701 PIMS Lead Implementer Combination Training Course: Learn how to lead and implement an ISO 27001 ISMS (information security management system) and ISO 27701 PIMS (privacy information management system) project. Acquire the skills to lead and manage an ISO 27001-compliant ISMS (information security management system) implementation project. Extend your knowledge to ensure full compliance with the ISO 27701 standard for a PIMS (privacy information management system). Significantly enhance your career prospects as an ISO 27001 implementer. Learn from anywhere. Choose the Classroom course or the Live Online option to study your way and keep travel and costs down to a minimum. Find out more. Successful completion of the courses and included exams leads to the IBITGQ Certified ISO 27001 ISMS Lead Implementer (CIS LI) and Certified ISO 27701 PIMS Lead Implementer (PI LI) qualifications.
tech writer

ISO27001/ISO27002 A Pocket Guide | IT Governance UK - 0 views

  •  
    Get a concise and accessible introduction to ISO27001 and ISO27002, allowing you to understand the benefits and features of an efficient Information Security Management System (ISMS). This indispensable pocket guide provides a useful overview of two important information security standards. Packed with practical advice for implementing an information security management system, you'll wonder how you coped without it. This indispensable pocket guide provides a useful overview of two important information security standards. Click here to buy
tech writer

AVG BreachGuard - 0 views

  •  
    Protect your personal data with AVG BreachGuard. Continuously monitor the dark web for leaked personal information. Receive alerts about threats to your privacy and tips on how to defend against them to reduce the risk of identity theft. Scan your accounts to learn if your personal information has been compromised. Protect your data from misuse - with BreachGuard. Find out what types of information data brokers are collecting about you. Automatically send requests to remove your personal information from data brokers' databases. Monitor intermediary databases to ensure that your information has been irrevocably deleted.
tech writer

Certified Information Privacy Technologist | CIPT Training & Certification | Learning Tree - 0 views

  •  
    Certified Information Privacy Technologist | CIPT Training & Certification | Learning Tree - This Certified Information Privacy Technologist Training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/ U.S. (CIPT/US) certification program
tech writer

CISA - Certified Information Systems Auditor Training Course | IT Governance UK - 0 views

  •  
    Build your senior career in information systems audit management with this in-depth four-day exam preparation course which will have you ready to pass the CISA exam the first time. Get ahead with CISA® (Certified Information Systems Auditor®) certification, the world-renowned standard of achievement for IT and business system auditors. Build your senior career in information systems audit management with this four-day exam preparation course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. This course uses the official ISACA® curriculum and includes the ISACA CISA Review and Questions, Answers & Explanations study guides. Successful completion of the course leads to 28 CPD points.
tech writer

Information Security & ISO27001 Staff Awareness E-learning course | IT Governance UK - 0 views

  •  
    Ensure your employees gain a better understanding of information security risks and ISO 27001 compliance requirements with this customisable e-learning course. Educate staff on their responsibilities and current information security threats to mitigate the risk of a breach. Comply with Clause 7.3 and control 7.2.2 of ISO 27001 by raising awareness and encouraging a culture of information security throughout your organisation. Customise the content by adding links to company documents, policies and procedures, and demonstrate compliance with Clause 7.3 and control 7.2.2. Test learner knowledge to prove compliance for auditing purposes. Fast deployment with instant access to the e-learning programme. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

BS 10012 2017 + A1 2018 Standard | IT Governance UK - 0 views

  •  
    Buy BS10012:2017 specification for a personal information management system (PIMS) updated to comply with the GDPR. Available as a PDF download or hardcopy. BS 10012 2017 +A1 2018 - Data protection - Specification for a personal information management system (PIMS) BS 10012:2017+A1:2018 specifies the framework for implementing a personal information management system (PIMS) in compliance with the General Data Protection Regulation (GDPR). This new version is an update to the 2009 edition of BS 10012:2017, which was specific to the 1998 Data Protection Act. The A1 2018 amendment takes in further small changes as a result of the UK Data Protection Act 2018.
tech writer

An International Guide to Data Security and ISO27001/ISO27002 | IT Governance UK - 0 views

  •  
    Now in its seventh edition, this comprehensive book gives guidance on implementing effective information security management. It also outlines international best practices for IT governance for organizations of all sizes and sectors, and demonstrates how to: Protect and enhance your organization with an ISO 27001-compliant ISMS (information security management system); Design, develop and implement a robust governance system that covers all aspects of data protection and information security; and Defend your organization against advanced, persistent cyber threats. This updated edition reflects changes to international legislation, including the GDPR (General Data Protection Regulation), and updates to BS 7799-3 and the ISO/IEC 27000 family. It also covers key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance.
tech writer

ISO 27001 Toolkit - The Comprehensive Suite | IT Governance UK - 0 views

  •  
    This ISO 27001 2013 Information Security Management System (ISMS) toolkit contains a complete set of tools and materials required for your ISMS to be ISO27001 certified. Align your information security activities with industry best practices, proving to stakeholders that you take information security seriously. Guarantee compliance with this comprehensive suite, which includes all four official ISO 27000 standards, the ISO 27001 Toolkit, and our risk assessment software, vsRisk. Halve your implementation costs and time spent generating your ISO 27001 documentation with more than 140 pre-written, customizable templates, policies, procedures, and documents. Our ISO 27001 Toolkit was developed by the global experts who led the first ISO 27001 certification project, so you can be sure you're on the right track. Meet local and global security laws, such as the GDPR (General Data Protection Regulation). This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
tech writer

CISM Training Course | IT Governance UK - 0 views

  •  
    An intensive and complete training course to help delegates pass the CISM exam the first time, with expert knowledge from leading trainers. Get ahead with CISM® (Certified Information Security Manager®) certification, the world-renowned standard of achievement for information security managers. Build your senior career in information security management with this specialist-led four-day exam preparation course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. This course uses the official ISACA® curriculum and includes the ISACA CISM Review and Questions, Answers & Explanations study guides. Successful completion of the course leads to 28 CPD points.
tech writer

ISO/IEC 27001 2013 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27001 2013 - Information Technology - Security techniques - information security management systems - requirements Standard. The newest (2013) version of the international standard for information security management systems (ISMSs). Looking for the 2017 version? Please be aware that the international standard is still the 2013 version. Some suppliers have republished country-specific versions of ISO/IEC 27001 (labeled ISO/IEC 27001:2017), which include additional corrigenda that were released after the 2013 publication date. These corrigenda are freely available from the ISO website for those who purchased the original version. They are also supplied by IT Governance when you purchase this standard.
tech writer

ISO/IEC 27002 2013 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27002:2013 guides the implementation of controls in Annex A in ISO/IEC 27001. ISO/IEC 27002:2013 - Information Technology - Security Techniques - Code of practice for information security controls Standard. The International Standard supports the implementation of an Information Security Management System (ISMS) based on the requirements of ISO 27001.
tech writer

ISO/IEC 27004 2016 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27004:2016 - Information Technology - Security techniques - information security management - measurement Standard. ISO/IEC 27004:2016 guides to help organizations evaluate the performance and effectiveness of an implemented ISMS (information security management system), as mandated in section 9.1 of ISO/IEC 27001:2013.
tech writer

ISO/IEC 27005 2018 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27005:2018, Information technology - Security techniques - Information security risk management Standard. The ISO/IEC 27005:2018 standard supports the information security risk management processes specified in ISO/IEC 27001.
tech writer

Microsoft Information Protection Administrator Training | SC-400 | Learning Tree | Lear... - 0 views

  •  
    Microsoft Information Protection Administrator Training | SC-400 | Learning Tree | Learning Tree - This course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
tech writer

Certified Information Privacy Professional | CIPP Training & Certification | Learning Tree - 0 views

  •  
    Certified Information Privacy Professional | CIPP Training & Certification | Learning Tree - This course teaches you the body of knowledge for the IAPP's globally recognized Information Privacy Professional/U.S. Government (CIPP/US) certification program.
tech writer

Information Security Breaches: Avoidance and Treatment (ISO27001) | IT Governance UK - 0 views

  •  
    Uses real-life information security incidents to explain how to reduce the risks of information security breaches and, crucially, what to do when they occur. Now updated to cover ISO27001:2013.
1 - 20 of 290 Next › Last »
Showing 20 items per page