top of page


Focus
Establishing, implementing, maintaining, and continually improving an information security management system (ISMS)
Target Audience
All types of organizations
Key Requirements
-
Risk assessment and risk management
-
Information security policy
-
Organizational roles and responsibilities
-
Asset management
-
Access control
-
Incident management
-
Business continuity and disaster recovery
bottom of page