article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

17 – Information Security Aspects of Business Continuity Management. media handling must prevent sensitive data’s unauthorized disclosure, alteration, removal, or destruction. Business Continuity Management Related to Information Security, Annex A.17 How Do You Perform a Gap Analysis?

article thumbnail

Choosing a Governance Risk and Compliance Tool: Constant Vigilance

Reciprocity

A risk management program incorporates processes, tools, procedures, and resources to optimize the risk profile, create a risk-aware culture, and implement the right mitigation strategies to maintain business continuity and competitiveness. Identify, assess, monitor, and control threats to business operations with a GRC tool.

article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

Social media has been used to promote the good work SEPA does and to try a portray it is business as usual. 4 Response Public and media sentiment on how well the incident has been managed 10 As the incident takes place during a holiday to date there has been no adverse comment on the incident. For more information click here.