ISO 27001 Handbook

ISO 27001 Handbook
Author :
Publisher : Independently Published
Total Pages : 286
Release :
ISBN-10 : 1098547683
ISBN-13 : 9781098547684
Rating : 4/5 (684 Downloads)

Book Synopsis ISO 27001 Handbook by : Cees Wens

Download or read book ISO 27001 Handbook written by Cees Wens and published by Independently Published. This book was released on 2019-12-24 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book helps you to bring the information security of your organization to the right level by using the ISO/IEC 27001 standard. An organization often provides services or products for years before the decision is taken to obtain an ISO/IEC 27001 certificate. Usually, a lot has already been done in the field of information security, but after reading the requirements of the standard, it seems that something more needs to be done: an 'information security management system' must be set up. A what? This handbook is intended to help small and medium-sized businesses establish, implement, maintain and continually improve an information security management system in accordance with the requirements of the international standard ISO/IEC 27001. At the same time, this handbook is also intended to provide information to auditors who must investigate whether an information security management system meets all requirements and has been effectively implemented. This handbook assumes that you ultimately want your information security management system to be certified by an accredited certification body. The moment you invite a certification body to perform a certification audit, you must be ready to demonstrate that your management system meets all the requirements of the Standard. In this book, you will find detailed explanations, more than a hundred examples, and sixty-one common pitfalls. It also contains information about the rules of the game and the course of a certification audit. Cees van der Wens (1965) studied industrial automation in the Netherlands. In his role as Lead Auditor, the author has carried out dozens of ISO/IEC 27001 certification audits at a wide range of organizations. As a consultant, he has also helped many organizations obtain the ISO/IEC 27001 certificate. The author feels very connected to the standard because of the social importance of information security and the power of a management system to get better results.


ISO 27001 Handbook Related Books

ISO 27001 Handbook
Language: en
Pages: 286
Authors: Cees Wens
Categories:
Type: BOOK - Published: 2019-12-24 - Publisher: Independently Published

DOWNLOAD EBOOK

This book helps you to bring the information security of your organization to the right level by using the ISO/IEC 27001 standard. An organization often provide
ISO 27001 controls – A guide to implementing and auditing
Language: en
Pages: 237
Authors: Bridget Kenyon
Categories: Computers
Type: BOOK - Published: 2019-09-16 - Publisher: IT Governance Ltd

DOWNLOAD EBOOK

Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand t
Information Security based on ISO 27001/ISO 27002
Language: en
Pages: 102
Authors: Alan Calder
Categories: Education
Type: BOOK - Published: 2009-07-31 - Publisher: Van Haren

DOWNLOAD EBOOK

Information is the currency of the information age and in many cases is the most valuable asset possessed by an organisation. Information security management is
IT Governance
Language: en
Pages: 384
Authors: Alan Calder
Categories: Business & Economics
Type: BOOK - Published: 2012-04-03 - Publisher: Kogan Page Publishers

DOWNLOAD EBOOK

For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can p
Implementing the ISO/IEC 27001:2013 ISMS Standard
Language: en
Pages: 224
Authors: Edward Humphreys
Categories: Computers
Type: BOOK - Published: 2016-03-01 - Publisher: Artech House

DOWNLOAD EBOOK

Authored by an internationally recognized expert in the field, this expanded, timely second edition addresses all the critical information security management i