Skip to main content

Home/ Groups/ Affiliate Window | affiliatewindow
tech writer

ISO 27001 Information Security Policy Template | IT Governance UK - 0 views

  •  
    Create an ISO 27001-compliant information security policy in minutes with our easy-to-use and customizable high-level template, developed by our expert ISO 27001 practitioners.
tech writer

ISO 27001 Gap Analysis Tool | IT Governance UK - 0 views

  •  
    ISO27001: 2013 compliant! This tool has a very specific, high-level purpose in any ISMS project, which is to quickly and clearly identify the controls and control areas in which an organization does not conform to the requirements of the standard. Designed to help prioritise work areas, this tool lists all the requirements from ISO 27001:2013 against which you can assess your current state of compliance.
tech writer

ISO 27001 2005 to ISO 27001 2013 Conversion Tool | IT Governance UK - 0 views

  •  
    Map the controls of ISO27001:2005 to ISO27001:2013 with this conversion tool. ISO 27001:2005 to ISO 27001:2013 - track the updates with this conversion guidance tool.
tech writer

ISO 27001 2005 to 2013 Gap Analysis Tool | IT Governance UK - 0 views

  •  
    Identify how you can make the transition from your ISO 27001: 2005 ISMS to ISO 27001: 2013 with this new Gap Analysis Tool.
tech writer

NIS Directive Gap Analysis | IT Governance UK - 0 views

  •  
    Get a true picture of how your current cyber security arrangements measure up against the requirements of the Network and Information Systems Regulations 2018 (NIS Regulations). Applicable to both DSP and OES.
tech writer

NIS Regulations (NIS Directive) mock audit | IT Governance UK - 0 views

  •  
    Gain confidence in passing compliance audits from the relevant competent authority, and maintain your organization's ability to effectively respond to and recover from disruptive incidents.
tech writer

Online Consultancy by the Hour | IT Governance UK - 0 views

  •  
    LiveOnline consultancy service for those needing short, sharp bursts of expert consultancy support on specific issues. Live Online support for those needing short, sharp bursts of expert consultancy on specific issues. Expert, independent view of your risk, compliance, and security frameworks. Cost-effective support delivered by the hour. Purchase the number of hours of consultancy support required in one-hour units.
tech writer

ISO 27001 Mentor and Coach Consultancy | IT Governance UK - 0 views

  •  
    This product brings you dedicated expertise through five days of scheduled coaching sessions with an ISO27001 consultant and covers each key stage of the ISO27001 implementation project. This offer is part of the 'Get A Lot Of Help' ISO 27001 consultancy package. Available anywhere in the world via our exclusive online consultancy service, it provides dedicated expertise and specialist knowledge over five days of scheduled coaching and project review sessions with an expert ISO 27001 consultant and covers each key stage of the ISO 27001 implementation project.
tech writer

ISO 27001 Managed Service | IT Governance UK - 0 views

  •  
    The ISO 27001 Managed Service helps you to proactively manage, monitor, and maintain your information security management system (ISMS), ensuring consistent conformity to ISO 27001.
tech writer

ISO 27001 Live Online Consultancy | IT Governance UK - 0 views

  •  
    Live online ISO27001 consultancy to support your implementation project, whenever and wherever you need it. ISO 27001 Live Online Consultancy provides quick, expert online consultancy support on specific issues whenever you need guidance with your ISO 27001 implementation.
tech writer

ISO/IEC 27017 2015 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27017:2015 - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services. ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services Standard. Guidelines for information security controls applicable to the provision and use of Cloud services. Essential information for organizations that want to provide Cloud services that can be incorporated into an ISO 27001-compliant information security management system (ISMS). Useful for organizations evaluating the security posture of potential Cloud service providers. Available in hardcopy and PDF formats.
tech writer

Official ISACA COBIT® 5 Enabling Information Guide | IT Governance UK - 0 views

  •  
    Perfect introduction to the principles and practice of the governance of enterprise IT using COBIT®5. Written by an experienced COBIT® trainer and practitioner, Geoff Harmer provides advice that is easy to follow and apply. This book includes: A practical introduction to the key concepts of COBIT® 5, ideal for anyone involved in an implementation project, or studying for the COBIT® 5 Foundation exam. The main frameworks and standards supporting the governance of enterprise IT (GEIT), putting the benefits of COBIT® 5 into context. [COBIT, GEIT, Enterprise IT, IT Governance, Governance Framework, COBIT5, COBIT 5,]
tech writer

The Cyber Security Handbook | IT Governance UK - 0 views

  •  
    The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) will: Work as a comprehensive cyber security implementation manual. Help organizations secure their information assets by providing a primer on the cyber security activities involved. Give practical guidance on the individual activities identified in the IT Governance CRF (Cyber Resilience Framework) that can help organizations become cyber resilient. Enable organizations to understand the threats and vulnerabilities that they face - technical, human, and physical - and how these can be mitigated.
tech writer

The Case for ISO 27001 | IT Governance UK - 0 views

  •  
    Understand ISO27001 (ISO 27001) and learn how it can help your organization fight cybercrime, combat cyber-terror, improve your corporate governance, and recover from accidents. A must-have for presenting the compelling business case for ISO 27001. With essential information from ISO 27001 expert Alan Calder, understand ISO 27001 and learn how your organization can: Fight cyber crime; Combat cyber terror; and Boost your corporate governance.
tech writer

NIS Regulations - A Pocket Guide for Operators of Essential Services | IT Governance UK - 0 views

  •  
    Gain a clear introduction to the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: The objectives, principles, and indicators of good practice, and gives implementation guidance; The key requirements for OES (operators of essential services); and How to comply with the Regulations
tech writer

NIS Regulations - A Pocket Guide for Digital Service Providers | IT Governance UK - 0 views

  •  
    Gain a clear understanding of the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: Which DSPs (digital service providers) are within scope; The key requirements; and How guidance from international standards can assist with compliance.
tech writer

Nine Steps to Success: An ISO 27001 Implementation Overview | IT Governance UK - 0 views

  •  
    The essential guide for anyone about to embark on an ISO 27001 implementation project, covering every step of the process from management buy-in to certification. A must-have guide from ISO 27001 expert Alan Calder to help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success: Details the key steps of an ISO 27001 project from inception to certification. Explains each element of the ISO 27001 project in simple, non-technical language. An ideal guide for anyone tackling ISO 27001 implementation for the first time.
tech writer

ISO 27001 in a Windows® Environment | IT Governance UK - 0 views

  •  
    This guide provides the IT manager with a detailed breakdown of the various controls required under ISO27001, together with the relevant Microsoft products that can be used to implement them. It should be a core part of the technical library of every MCSE and of every information security practitioner. [ISO27001, Windows, Windows environment, information Security, MCSE, ISMS]
tech writer

ISO 27001 Assessments Without Tears - A Pocket Guide | IT Governance UK - 0 views

  •  
    Ensure you are prepared for your audit - find out what an ISO 27001 assessment is, why organizations bother with them, and what individual staff should do when questioned by the auditor. Now updated for ISO 27001:2013.
tech writer

ISO 27001 controls - A guide to implementing and auditing | IT Governance UK - 0 views

  •  
    Ideal for information security managers, auditors, consultants, and organizations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
« First ‹ Previous 2301 - 2320 of 2697 Next › Last »
Showing 20 items per page