Cyber threat image

Audit Results – ISMS V2022 Series

Ensuring that audit results are reported to management and that documented information about the audit program and audit results is retained requires a systematic approach that includes clear communication channels, defined responsibilities, and robust documentation practices. Here’s a step-by-step guide:

Read More »
Cyber threat image

Non-Conformities & Corrective Actions – ISMS V2022 Series

To ensure that non-conformities identified during audits are subject to corrective action, a robust and well-documented corrective action process must be in place. Here’s a comprehensive approach to achieve this: 1. Establish a Corrective Action Process Procedure Documentation: Develop and document

Read More »
Cyber threat image

Management Reviews – ISMS V2022 Series

Evidence that top management undertakes a review of the Information Security Management System (ISMS) at planned intervals can be demonstrated through various documented information and records. These documents should clearly show the involvement of top management in the review process,

Read More »
Cyber threat image

Outputs of the Management Review – ISMS V2022 Series

To know that the output from the ISMS management review identifies changes and improvements, you should look for specific elements within the documented results of the management review meetings. These elements should clearly indicate that top management has considered the

Read More »
Cyber threat image

Non-Conformity Management – ISMS V2022 Series

To ensure that actions to control, correct, and deal with the consequences of non-conformities have been identified and effectively addressed, follow a structured approach that includes identification, documentation, planning, and verification. Here’s a comprehensive guide: 1. Identification of non-conformities Detection

Read More »