ISO/IEC 27001
IMPLEMENTING ISO/IEC 27001 SYSTEM
By implementing information security management system within the meaning of a norm ISO/IEC 27001 organization declares, that it has all the information and assets under control.
If your organization decides to implement on of ISO/IEC 27001 norms, which address information security management, we will gladly help you with elaboration of a complete documentation and preparations for certification.
If your organization decides to implement on of ISO/IEC 27001 norms, which address information security management, we will gladly help you with elaboration of a complete documentation and preparations for certification.
WE WILL HELP YOU TO
define ISMS in relation with your assets
identify, analyze and assets risks to each asset
identify objectives and programs for handling the risks
implement the most optimal practices for risk handling
create efficient security policies and directives
create continual information security management
train information security managers
handle internal and customer audit
meet the requirements of information security legislation
WHY US
Many organizations, which decided to implement international norm ISO/IEC 27001 on their own, tried to elaborate ISMS documents based on ISO/IEC 27002, which contains a code of practice for information security management. That, however, contains general guidance on recognized information security management objectives and procedures. Organizations here encounter a problem with qualification and a lack of experience of their own staff, which is often able to cover only parts of the whole ISMS system. Due to their personal involvement in the ISMS process, they often lack an objective attitude towards information security management.
We offer you an independent attitude and a third-party approach of our qualified staff. Thanks to our experience, we are able to propose optimal information security management solutions based on the best practices. These procedures will copy specific assets and risks.
We are able to implement the whole system turn-key ready.
We offer you an independent attitude and a third-party approach of our qualified staff. Thanks to our experience, we are able to propose optimal information security management solutions based on the best practices. These procedures will copy specific assets and risks.
We are able to implement the whole system turn-key ready.
CERTIFICATION
Our qualified consultants will ensure that all ISMS documents required for ISO/IEC 27001 certification are elaborated. In case of interest (based on contract) we can continuously carry out risk analyzes and evaluations, as well as internal audits according to the requirements of the norms.
We have long-term international experience in implementing ISO/IEC 27001.
IOSEC assumes responsibility for processed ISMS documents for system certification.
We have long-term international experience in implementing ISO/IEC 27001.
IOSEC assumes responsibility for processed ISMS documents for system certification.
TRAINING
The requirement of the standard is to have trained internal auditors, who will continuously monitor the effectivity of the ISMS and help executives to determine whether the objectives of information security are in line with the business objectives of the organization.
These skills can be acquired by training employees as internal auditors or, if appropriate, as information security managers.
These skills can be acquired by training employees as internal auditors or, if appropriate, as information security managers.
TRAINING OFFER
ISO/IEC 27001
familiarization with the standard and its basic objectives
INTERNAL AUDITOR
training for future or existing internal auditors
LEAD AUDITOR
training for future or existing leading auditors
INFORMATION SECURITY MANAGER
training of the information security manager in accordance with ISO/IEC 27001 requirements