Skip to Main Content
Select regional store:
Special offer! Get a free e-book when you purchase a training course online before 30 September!
PAS 555 2013 Cyber Security Risk Governance and Management Specification

PAS 555 2013 Cyber Security Risk Governance and Management Specification

SKU: 4246
Publishers: BSI
Format: Hardcopy
Published: 20 May 2013
Availability: In Stock

PAS 555:2013 is an outcomes-based, holistic approach to cybersecurity.

Price: $127.00

PAS 555:2013 Cyber Security Risk Governance and Management Specification

PAS 555 supplies a holistic framework for effective cybersecurity which not only considers the technical aspects, but also the related physical, cultural, and behavioural aspects of an organization’s approach to addressing cyber threats, including effective leadership and governance.

Through this approach, PAS 555 enables organizations to:

  • Focus investment in the most appropriate way, minimizing potential losses and improving operational effectiveness and efficiency
  • Develop organizational resilience by improving loss prevention and incident management
  • Identify and mitigate cyber security risk throughout the organization

PAS 555 applies to the whole organization and its supply chain, avoiding the dangers that can arise when the security measures fail to cover the whole of the business. It is an adaptable approach which can apply to any organization, whatever its size or type, whether commercial, not-for-profit or public sector.

PAS 555’s flexibility allows an organization to utilise its own defined processes or the adoption of other standards and management systems to achieve its intended cybersecurity ends. PAS 555 can be used alone, but is also compatible with many major security standards, such as ISO20000-1, ISO27001, ISO22301 and ISO31000.

Full contents

  • Introduction
  • Scope
  • Terms and definitions
  • Management structure
  • Commitment to a cyber security culture
  • Security context
  • Business architecture strategy
  • Capability development strategy
  • Supplier and partner strategy
  • Technology strategy
  • Business resilience
  • Compliance with legislation and other standards
  • Risk assessment
  • Protection and mitigation
  • Detection and response
  • Recovery
  • Compliance analysis and continual improvement
  • Annexes
  • Bibliography

Customer Reviews

stars out of 5
(0# of Ratings:)
This website uses cookies. View our cookie policy