Learn how to implement an ISMS in 9 steps

With the recent surge in cyber attacks and an increased focus on data protection, it’s more important than ever to improve your organization’s cybersecurity. ThreatMetrix reports that, in first quarter of 2017, it detected more than 130 million attacks in real time. That’s the highest figure ever recorded by the security firm, which credits this rise in part to the increase in device spoofing, identity fraud, location manipulation, and bots.

To help protect your organization from threats like these, you should have an information security management system (ISMS). An ISMS is a systematic approach to managing confidential or sensitive company information so that it remains secure. It encompasses people, processes, and technology – recognizing that information security isn’t just about antivirus software, implementing the latest firewall, or locking down your laptops and web servers.

The international standard ISO 27001 sets out the requirements you need to meet to implement an ISMS. To further help you, IT Governance has produced a free green paper, Implementing an ISMS – The nine-step approach. The paper explains what an ISMS is in more detail, what makes them successful, and why you need to have one in place. It then gives you an overview of nine things you need to do in order to successfully implement, maintain, and certify an ISMS, covering:

  • Important considerations for every step of the ISMS process
  • The challenges you’ll face when creating your ISMS
  • A tried-and-tested implementation approach that will save you time and money

The steps outlined in the green paper cover the full extent of the project, from initial discussions with managers through to testing the completed project and pursuing accredited certification.

Download Implementing an ISMS – The nine-step approach >>