article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

13 – Communications Security. Communications Security, Annex A.13 How Do You Perform a Gap Analysis? Theoretically an organization can do a gap analysis at any time, but timing is essential to optimize its impact. The ISO 27001 gap analysis does that. 9 – Access Control.

article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

Perform a Gap Analysis. A gap analysis gives you a high-level summary of what needs to be done to attain certification and allows you to examine and compare your organization’s current information security arrangements to the ISO 27001 standards. Third, create a project plan and a project risk register.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Audit Checklist for SOC 2

Reciprocity

Communication and information. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis. While performing your SOC 2 gap analysis, you must select an audit firm to conduct your SOC 2. Control environment. Risk assessment.

Audit 52
article thumbnail

Preparation Continues for the Digital Operational Resilience Act

Fusion Risk Management

The DORA unifies ICT-related (information and communications technology) incident management processes by introducing a standard incident classification methodology with a set of prescriptive criteria (including the number of users impacted, duration, geographic spread, data loss, impact to ICT systems, and criticality of services affected).

article thumbnail

5 Steps To Developing A Corporate Compliance Program

Reciprocity

Establish two-way communication at all levels. Set the expectation that workers would communicate proactively and in a timely way, whether it is to ask compliance questions, report difficulties, or address ethical concerns.

Audit 52
article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

It has t aken four to five weeks for SEPA to get their communications and messages sorted out. The list of priorities has now been written, which is guiding their response and has replaced the nonsensical ones from their earlier communications. Even with the improvements in communication, there are still a number of issues.

article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

It has t aken four to five weeks for SEPA to get their communications and messages sorted out. The list of priorities has now been written, which is guiding their response and has replaced the nonsensical ones from their earlier communications. Even with the improvements in communication, there are still a number of issues.