ISO 27001 and BS 25999-2: Why is it better to implement them together?
Posted on 22 February 2012.
Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 Business continuity management. The problem is that ISO 27001 does require such a control, but it doesn't provide details about how to do it.

This is where BS 25999-2 fits in it describes all the steps for business continuity, from writing the BCM policy to performing the business impact analysis, defining the strategy, writing the plans etc. Therefore, when it comes to implementing your BCM within the ISO 27001 project, the easiest thing to do is to use BS 25999-2.

BS 25999-2 is becoming the leading standard for BCM worldwide not only because it has the same management structure and is compatible with ISO 27001, ISO 9001 and other management standards, but also because it provides a very clear and logical path on how to implement and operate business continuity in your organization.

Register for this free webinar to learn:
  • Why is BS 25999-2 useful for ISO 27001?
  • Similarities and differences between ISO 27001 and BS 25999-2
  • Implementation issues implement them in parallel or separately?
  • Roles to what extent can you use the same personnel
  • Top management issues what must top management take into account.
This interactive live online training is designed to enable you to walk away with important skills for being able to use BS 25999-2 for implementing business continuity within the ISO 27001 project.

The course offers compelling content, downloadable presentation deck and live engagement with an expert consultant with whom you can discuss how to resolve your specific implementation issues. You will experience the training right from your desk, eliminating travel costs and minimizing lost time away from your office.


eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Dec 18th