Norms
 |
ISO/IEC 27001:2022
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
|
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
|
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
|
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
|
|
serves to assess the level of security by simulating situations that would be used by an attacker
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... viac...
Source: it.portal
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|