Remove Alert Remove Communications Remove Gap Analysis Remove Vulnerability
article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

13 – Communications Security. Technical vulnerability management is covered in Annex A.12.6, Communications Security, Annex A.13 How Do You Perform a Gap Analysis? Theoretically an organization can do a gap analysis at any time, but timing is essential to optimize its impact. 13 (7 controls).

article thumbnail

Choosing a Governance Risk and Compliance Tool: Constant Vigilance

Reciprocity

By improving collaboration and communication among various groups, such as audit, information security, compliance, and risk management, you can resolve issues faster with minimal confusion or rework. Then, link SLAs to vendors and contracts and send reminders or alerts when you identify issues that affect vendor performance.