The office of Brian Kemp, Georgia Secretary of State, has launched an investigation into the Georgia Democratic Party. It believes the Democrats were connected to an attempted hack of Georgia’s voter registration system. The Democrats deny the charge.
Cybersecurity in elections
Whether or not the allegation is true, cybersecurity is a critical issue in politics. Earlier this year, a whistleblower revealed that Facebook turned a blind eye as data analytics company Cambridge Analytica harvested 50 million users’ profiles from an app. These profiles were used to help Donald Trump’s election team predict and influence people’s choices at the 2016 election.
Protect your organization
In order to achieve a robust cybersecurity posture, organizations must recognize that expensive cybersecurity software alone is not enough.
The international standard ISO/IEC 27001 takes a holistic approach to information security, addressing people, processes, and technology. It sets out the requirements of an ISMS (information security management system) that can be independently audited and certified by an accredited certification body.
Creating an ISO 27001-compliant ISMS will help your organization meet numerous legal and regulatory compliance requirements. These requirements include state data breach notification laws and federal regulations – such as FISMA, the GLBA, HIPAA, and SOX – and international standards such as the PCI DSS.
Learn how to implement ISO 27001 and audit against its requirements
IT Governance’s ISO27001 Lead Implementer and Lead Auditor Combination Online training course will guide you through the process of implementing an ISO 27001-compliant ISMS. You will gain an understanding of the activities needed to plan, implement, and maintain a best-practice ISMS.
You can discover how to prepare for a data breach by visiting our #BreachReady page. We break the process down into six simple steps and recommend tools and services you can use to complete each task.