ISO 27001: An overview of ISMS implementation process
Posted on 10 June 2014.
Although many people consider ISO 27001 as a bureaucratic standard with no real benefits, actually the opposite is true – if it is implemented properly, not only will it enhance the marketing position of your organization, but it will also help you organize all information security activities in a clearly defined framework, and consequently decrease the level of risks.

If you are an information security professional, it will decrease the time needed to figure out how to set the system for planning the implementation, assessing and treating risks, involving your management at crucial points and enable measurement of the fulfillment of objectives.

ISO 27001 exhibits its full strength if used throughout the whole process of information security project – when planning all the activities, when implementing them, all up to measuring them if they achieved the desired objectives.

Register for this webinar to learn:
  • Family of ISO 27k standards – for what purpose should each standard be used
  • 17 steps towards ISO 27001 certification
  • Key benefits and how to present them to management
  • Tips for implementation – using tools, hiring a consultant, costs involved, how long does it take
  • Documentation required by the standard.
This interactive live online training (via webinar) is designed to enable you to walk away with knowledge on how to fit ISO 27001 as the main framework for information security management in your organization.

This course offers compelling content, downloadable presentation deck and live engagement with an expert consultant with whom you can discuss how to resolve your specific implementation issues. You will experience the training right from your desk, eliminating travel costs and minimizing lost time away from your office.


How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victim’s financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Mon, Sep 22nd