scope (Clause 4.1) Understanding the organization and its context: The organization must determine its external and internal issues which should be relevant to its purpose and can affect its ability to achieve the intended outcome of its information security management system Scope (Clause 4.2) Understanding the needs and expectations of interested parties: The organization must determine the interested parties and their requirement that are relevant to the information security management system Scope (Clause 4.3) Determining the scope of the information security management system: The organization must determine the boundaries and applicability of the information security management system to establish its scope. Information security policy (Clause 5.2) Information security risk assessment process (Clause 6.1.2) Information security risk treatment process, including the Statement of Applicability (Clause 6.1.3d) and risk treatment plan (Clause 6.1.3e) Information security objectives (Clause 6.2) Evidence of competence (Clause 7.2) Documented information “determined by the organization as being necessary for the effectiveness of the [ISMS]” (Clause 7.5.1b) Information necessary to have confidence that the processes required for operational planning and control have been carried out as planned (Clause 8.1) Results of information security risk assessments (Clause 8.2) Results of information security risk treatment (Clause 8.3) Evidence of performance monitoring and measuring results (Clause 9.1) Internal audit program(s) and audit results (Clause 9.2g) Evidence of the results of management reviews (Clause 9.3) Evidence of the nature of the nonconformities and any subsequent actions taken, and the results of any corrective actions (Clause 10.1)
Requesting u to arrange videos by 'topic-name - serial number' to enable viewers to get knowledge in correct/choronological manner.....Thanks LUV for your fine effort...
Hello Maha, PECB is a certification body for persons, management systems, and products of international standards. It provides training, examination, audit and certification services. For more, please visit our website: pecb.com/
You can read the webinar slides here: www.slideshare.net/PECBCERTIFICATION/16-steps-in-the-iso-27001-implementation and contact Dejan if you need more information, please.
scope (Clause 4.1) Understanding the organization and its context: The organization must determine its external and internal issues which should be relevant to its purpose and can affect its ability to achieve the intended outcome of its information security management system Scope (Clause 4.2) Understanding the needs and expectations of interested parties: The organization must determine the interested parties and their requirement that are relevant to the information security management system Scope (Clause 4.3) Determining the scope of the information security management system: The organization must determine the boundaries and applicability of the information security management system to establish its scope. Information security policy (Clause 5.2) Information security risk assessment process (Clause 6.1.2) Information security risk treatment process, including the Statement of Applicability (Clause 6.1.3d) and risk treatment plan (Clause 6.1.3e) Information security objectives (Clause 6.2) Evidence of competence (Clause 7.2) Documented information “determined by the organization as being necessary for the effectiveness of the [ISMS]” (Clause 7.5.1b) Information necessary to have confidence that the processes required for operational planning and control have been carried out as planned (Clause 8.1) Results of information security risk assessments (Clause 8.2) Results of information security risk treatment (Clause 8.3) Evidence of performance monitoring and measuring results (Clause 9.1) Internal audit program(s) and audit results (Clause 9.2g) Evidence of the results of management reviews (Clause 9.3) Evidence of the nature of the nonconformities and any subsequent actions taken, and the results of any corrective actions (Clause 10.1)
Thanks for help sharing updated information "16 Steps in the ISO 27001 Implementation".
Great webinar; all key steps included.
Thank you by the way, everything is so much clear now :)
Thank you for your comments. Here is the link to join upcoming PECB Webinars: pecb.com/webinars
Great...
Will like to be informed of any upcoming webinar. Thanks
Hello Michael, here is the link of PECB upcoming webinars: pecb.com/webinars
Can you post the link to the mandatory documents?
scope (Clause 4.1) Understanding the organization and its context: The organization must determine its external and internal issues which should be relevant to its purpose and can affect its ability to achieve the intended outcome of its information security management system
Scope (Clause 4.2) Understanding the needs and expectations of interested parties: The organization must determine the interested parties and their requirement that are relevant to the information security management system
Scope (Clause 4.3) Determining the scope of the information security management system: The organization must determine the boundaries and applicability of the information security management system to establish its scope.
Information security policy (Clause 5.2)
Information security risk assessment process (Clause 6.1.2)
Information security risk treatment process, including the Statement of Applicability (Clause 6.1.3d) and risk treatment plan (Clause 6.1.3e)
Information security objectives (Clause 6.2)
Evidence of competence (Clause 7.2)
Documented information “determined by the organization as being necessary for the effectiveness of the [ISMS]” (Clause 7.5.1b)
Information necessary to have confidence that the processes required for operational planning and control have been carried out as planned (Clause 8.1)
Results of information security risk assessments (Clause 8.2)
Results of information security risk treatment (Clause 8.3)
Evidence of performance monitoring and measuring results (Clause 9.1)
Internal audit program(s) and audit results (Clause 9.2g)
Evidence of the results of management reviews (Clause 9.3)
Evidence of the nature of the nonconformities and any subsequent actions taken, and the results of any corrective actions (Clause 10.1)
Where is the link to your book?
Thank you for the tool kit
Requesting u to arrange videos by 'topic-name - serial number' to enable viewers to get knowledge in correct/choronological manner.....Thanks LUV for your fine effort...
came across here, quite mesmerized by the speaker skill.
thats really amazing and helpfull
Thank you Maha :)
what is PCB?
Hello Maha,
PECB is a certification body for persons, management systems, and products of international standards. It provides training, examination, audit and certification services.
For more, please visit our website: pecb.com/
Sir,
Please provide the mandatory documents list.
You can read the webinar slides here: www.slideshare.net/PECBCERTIFICATION/16-steps-in-the-iso-27001-implementation and contact Dejan if you need more information, please.
scope (Clause 4.1) Understanding the organization and its context: The organization must determine its external and internal issues which should be relevant to its purpose and can affect its ability to achieve the intended outcome of its information security management system
Scope (Clause 4.2) Understanding the needs and expectations of interested parties: The organization must determine the interested parties and their requirement that are relevant to the information security management system
Scope (Clause 4.3) Determining the scope of the information security management system: The organization must determine the boundaries and applicability of the information security management system to establish its scope.
Information security policy (Clause 5.2)
Information security risk assessment process (Clause 6.1.2)
Information security risk treatment process, including the Statement of Applicability (Clause 6.1.3d) and risk treatment plan (Clause 6.1.3e)
Information security objectives (Clause 6.2)
Evidence of competence (Clause 7.2)
Documented information “determined by the organization as being necessary for the effectiveness of the [ISMS]” (Clause 7.5.1b)
Information necessary to have confidence that the processes required for operational planning and control have been carried out as planned (Clause 8.1)
Results of information security risk assessments (Clause 8.2)
Results of information security risk treatment (Clause 8.3)
Evidence of performance monitoring and measuring results (Clause 9.1)
Internal audit program(s) and audit results (Clause 9.2g)
Evidence of the results of management reviews (Clause 9.3)
Evidence of the nature of the nonconformities and any subsequent actions taken, and the results of any corrective actions (Clause 10.1)
How can I get intimation about next webinars? I am interested to join it.
Please subscribe here: pecb.com/en/subscription and you will receive information regarding new webinars!
Hi is it Possible to get a copy of these Slides?
Hello! Slides are available at the following link only for reading purposes: bit.ly/1sS3G9u
ахах сразу слышно что русский
my god, you are good, but you seem exhausted!