article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

The ISO 27001 family, published by the International Organization for Standardization, includes a set of standards for information security. The 27001 standard provides requirements for businesses to implement and operate an Information Security Management System, or ISMS. What is ISO 27001? Getting Certification for ISO 27001.

Audit 52
article thumbnail

The Digital Operational Resilience Act is Finalized – Now is the Time to Act

Fusion Risk Management

The regulation is intended to make compliance obligations less confusing and provide greater security for consumers by creating unified standards for third-party risk monitoring, performance, and auditing. . The DORA is landmark legislation that is the first of its kind that focuses on how regulated entities manage their ICT risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

Over the last four weeks, I have been publishing a running commentary on their response here. If your organisation is not yet ready to respond effectively to a cyber incident, we can help by carrying out a Cyber Incident Gap Analysis and you could attend our 2 day NCSC Certified Managing & Preparing for Cyber Incidents Course.

article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

Over the last four weeks, I have been publishing a running commentary on their response here. If your organisation is not yet ready to respond effectively to a cyber incident, we can help by carrying out a Cyber Incident Gap Analysis and you could attend our 2 day NCSC Certified Managing & Preparing for Cyber Incidents Course.