Skip to Main Content
Select regional store:
Privacy as a Service | The simplest, fastest, and most affordable way to comply with data privacy laws | Find out more
PAS 555 2013 Standard

PAS 555 2013 Standard

SKU: 4246
Publishers: BSI
Format: Hardcopy
Published: 20 May 2013
Availability: In Stock

PAS 555 supplies a holistic framework for effective cybersecurity which not only considers the technical aspects, but also the related physical, cultural, and behavioural aspects of an organization’s approach to addressing cyber threats, including effective leadership and governance.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our training sales team on +1 877 317 3454.

Price: $150.00

PAS 555:2013 Cyber Security Risk Governance and Management Specification 

Through this approach, PAS 555 enables organizations to:

  • Focus investment in the most appropriate way, minimizing potential losses and improving operational effectiveness and efficiency
  • Develop organizational resilience by improving loss prevention and incident management
  • Identify and mitigate cyber security risk throughout the organization

PAS 555 applies to the whole organization and its supply chain, avoiding the dangers that can arise when the security measures fail to cover the whole of the business. It is an adaptable approach which can apply to any organization, whatever its size or type, whether commercial, not-for-profit or public sector.

PAS 555’s flexibility allows an organization to utilise its own defined processes or the adoption of other standards and management systems to achieve its intended cybersecurity ends. PAS 555 can be used alone, but is also compatible with many major security standards, such as ISO 20000-1, ISO 27001, ISO 22301 and ISO 31000.

Full contents

  • Introduction
  • Scope
  • Terms and definitions
  • Management structure
  • Commitment to a cyber security culture
  • Security context
  • Business architecture strategy
  • Capability development strategy
  • Supplier and partner strategy
  • Technology strategy
  • Business resilience
  • Compliance with legislation and other standards
  • Risk assessment
  • Protection and mitigation
  • Detection and response
  • Recovery
  • Compliance analysis and continual improvement
  • Annexes
  • Bibliography

Customer reviews

This website uses cookies. View our cookie policy