Does a customer who uses a cloud service provider with ISO27017 compliance, need their own certificate to be compliant themselves?

ISO 27017 advises both cloud service customers and providers. Microsoft Azure is compliant with ISO27017.

Let us say that a cloud service customer who uses Microsoft Azure wants to be compliant with ISO27017 – I assume that… Continue reading Does a customer who uses a cloud service provider with ISO27017 compliance, need their own certificate to be compliant themselves?

Is there a default assets grouping in order to perform Information Security Risk Assessment?

I am working on the implementation of an ISMS and aiming to get 27001 certification. While i was conducting the Risk Assessment, I found it difficult to match all those assets/asset components with all the threats/threat events without mak… Continue reading Is there a default assets grouping in order to perform Information Security Risk Assessment?

Internal Audit and IT: Joining the Same Cybersecurity Team

Effective cybersecurity management requires cross-collaboration between multiple stakeholders, and becomes increasingly complex with larger organizations. Though technology can serve as a solution to mitigate security risk, oftentimes the solution… Continue reading Internal Audit and IT: Joining the Same Cybersecurity Team

Change & Configuration Management Waves Revolutionizing Cybersecurity

Configuration management is a buzzword that gets tossed around quite a lot these days. Defined as the process of identifying, controlling, tracking, and auditing changes made to a baseline, configuration management is a critical part of a strong s… Continue reading Change & Configuration Management Waves Revolutionizing Cybersecurity

Which Cybersecurity Framework is Right for You?

SOC 2, CIS, NIST, ISO27001, PCI and more. How do you choose?
Given the growing amount of information and data that businesses of all sizes are having to manage, great cybersecurity is increasingly the most critical element of IT. Accenture estimat… Continue reading Which Cybersecurity Framework is Right for You?