July 2024
Intermediate to advanced
486 pages
11h 19m
English
Once the information security management structure has been thought through, the initial ISMS establishment issues have been completely under-stood, and the initial training of the key personnel who will be involved in the development of the policy has been put in place, the first and second steps in the Plan phase can be carried through.
The Standard requires (at 4.1 and 4.2, respectively) that the context of the organization, as well as the requirements of interested parties, be identified (and preferably documented) as a preliminary step to determining both the scope of the ISMS and its overarching policy. This requirement simply forces the organization to consider, ...
Read now
Unlock full access