Video Tutorial: How to Write the ISMS Policy According to ISO 27001
|Avoid the gap between information security policy development and implementation|
Video tutorial that will help you understand not only what is information security policy within the context of ISO 27001, but also how to benefit from it by getting your top management to actively participate in information security issues.
Dejan Kosutic, one of the leading ISO 27001 experts, will explain which steps you must take to write the ISMS Policy and will show you an example of information security policy by filling in an information security policy template.
ISMS policy is not the same thing as IT security policy - this video tutorial will help you understand the wider context of information security and thus lay the foundations of information security management.
|Preview of chapters #1, #4 and #7:||___||
Target audience: Companies that want to define basic ISMS rules at the beginning of their ISO 27001 project, after the ISMS scope has been defined and before they start the risk assessment process
Document presented in video: Information Security Management System Policy
Presenter: Dejan Kosutic
Access: Unlimited number of views immediately after payment
Duration: 30m 4s
Format: Streaming video (delivered online)
About Information Security & Business Continuity Academy (IS&BCA)
IS&BCA is a largest resource of knowledge and materials that helps companies from over 40 countries worldwide to implement ISO 27001, ISO 22301 and BS 25999-2. Our aim is to enable professionals to implement this important task with minimum effort and with a high level of satisfaction of top management.
If you are not satisfied with your video tutorial(s) for any reason, we'll give you your money back - contact us within 10 days of your purchase and we'll refund you 100% of your money. No questions asked – we guarantee it!
100% secure online billing
We use Secure Socket Layer (SSL) technology, the industry standard and among the best available today for secure online commerce transactions. All of your personal information, including credit card number, name, and address is encrypted so it cannot be read during transmission. You are protected by your credit card company in the case of a fraudulent transaction with any purchase.