The Human Threat to Information Security

The human factor is a significant aspect of information security threats. Research consistently shows that a substantial portion of security incidents can be attributed to human actions, either intentional or unintentional. Here are some key insights: Human Error: Studies often suggest that human error is a leading cause of security breaches. For instance, a 2023 report […]
Cyber Crime & Information Security in Latin America – Statistics & Facts

The technological development of the last decades has been marked by the rapid and growing adoption of the internet. However, this hyperconnectivity has made the common user, as well as governments and companies, a new target for criminal activity. Protecting networks, systems and data from cyber-attacks has thus become a must for anyone connecting to the […]
Example of a Program to Ensure ISMS Achieves Its Outcomes – ISMS V2022 Series

Example of a Program to Ensure ISMS Achieves Its Outcomes 1. Program Overview Objective: To ensure that the Information Security Management System (ISMS) achieves its desired outcomes, and that requirements and objectives are effectively developed, implemented, and monitored. Scope: This program applies to all ISMS-related activities within the organization, covering all departments and stakeholders involved […]
Documented Evidence – ISMS V2022 Series

Documented evidence is crucial in demonstrating that processes within an Information Security Management System (ISMS) have been carried out as planned. For ISO 27001: 2022 compliance, the following types of documented evidence can be used: 1. Policies and Procedures Information Security Policy Document detailing the organization’s commitment to information security. Procedure Documents Detailed step-by-step instructions […]
Verifying the Changes are Planned and Controlled – ISMS V2022 Series

Verify that changes are planned and controlled, and that unintended changes are reviewed to mitigate any adverse results, you can implement a robust Change Management process. This process should include specific steps, roles, responsibilities, and tools to ensure that all changes are handled properly. Here’s a detailed approach to verifying effective change management: 1. Change […]
Information Security for Outsourced Processes – ISMS V2022 Series

Verify that outsourced processes have been determined and controlled. This is crucial for ensuring that the Information Security Management System (ISMS) remains effective and compliant with ISO 27001: 2022 standards. Here are the steps and methods to verify that outsourced processes are properly identified and controlled: 1. Identification of Outsourced Processes A. Documentation of Outsourced […]
When to perform a Risk Assessment – ISMS V2022 Series

Follow the next steps and verification methods, to validate that information risk assessments are performed at planned intervals or when significant changes occur, and that documented information is appropriately retained: 1. Establish Risk Assessment Procedures A. Documented Risk Assessment Procedures Actions: · Develop detailed procedures outlining how risk assessments are conducted. · Specify the frequency of assessments […]
The ISMS Performance & Effectiveness – ISMS V2022 Series

Evaluating the information security performance and the effectiveness of an Information Security Management System (ISMS) involves several steps and methodologies. Here are key areas to focus on: 1. Defining Metrics and KPIs · Key Performance Indicators (KPIs): Define KPIs relevant to your organization. These could include incident response times, number of security incidents, number of vulnerabilities […]
What to monitor and measure, when y by who – ISMS V2022 Series

Determining what needs to be monitored and measured, when, by whom, the methods to be used, and when the results will be evaluated requires a structured approach. Here’s a step-by-step process to help you establish this: 1. Define Objectives and Scope Objectives: Clearly define the goals and objectives of your information security program. These could […]
Ensuring compliance with the standard ISO 27001: 2022 – ISMS V2022 Series

To ensure compliance with standards like ISO/IEC 27001 and to effectively manage and improve your Information Security Management System (ISMS), you should keep detailed and well-organized documented information as evidence of the results of monitoring and measurement. Here’s a comprehensive list of what should be documented: 1. Monitoring and Measurement Plans Monitoring Schedule: Details of what […]