Remove Accreditation Remove Continual Improvement Remove Management
article thumbnail

When is an ISO not an ISO?

Plan B Consulting

I entered a competitive bid for some work at a large facilities management company, quoting £25k to put them through the whole business continuity lifecycle and assist in getting them certified to ISO 22301. They had a number of existing ISO’s and wanted to achieve the business continuity one. The post When is an ISO not an ISO?

article thumbnail

When is an ISO not an ISO?

Plan B Consulting

I entered a competitive bid for some work at a large facilities management company, quoting £25k to put them through the whole business continuity lifecycle and assist in getting them certified to ISO 22301. They had a number of existing ISO’s and wanted to achieve the business continuity one. The post When is an ISO not an ISO?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

Deciphering the various numbers can be confusing at first, but each standard is numbered and deals with a specific facet of managing your company’s information security risk management efforts. The 27001 standard provides requirements for businesses to implement and operate an Information Security Management System, or ISMS.

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

For almost ten years, NIST has been at the forefront of developing comprehensive cybersecurity risk management frameworks. These families categorize the wide array of cybersecurity measures recommended for robust information security management. PM – Program Management: Oversight and management of security programs.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

For almost ten years, NIST has been at the forefront of developing comprehensive cybersecurity risk management frameworks. These families categorize the wide array of cybersecurity measures recommended for robust information security management. PM – Program Management: Oversight and management of security programs.