ISO 27001 Webinars 

ISO/IEC 27001 certification demonstrates to existing and potential customers that an organization has defined and put in place best-practice information security processes. ISO 27001 is the only auditable international standard that defines the requirements of an information security management system (ISMS).

An ISMS is a set of policies, procedures, processes, and systems that manage information risks, such as cyber attacks, hacks, data leaks, or theft. By implementing an ISMS certified to ISO 27001, your organisation can benefit greatly: avoiding the losses and financial penalties associated with data breaches, winning new business, and strengthening relationships with existing clientele.

On demand ISO 27001 webinars

ISO 27701: the new privacy extension for ISO 27001  

ISO 27701, introduced earlier in the year, is an extension to ISO 27001, the international standard that describes best practise for an ISMS (information security management system).

ISO 27701’s approach recognises that by expanding on ISO 27001’s clauses and Annex A controls that relate specifically to data privacy, as well as providing two additional sets of controls specific to data controllers and data processors, your organisation will be able to demonstrate that it has taken the steps to comply with international privacy laws and regulations.


ISO 27001, cybersecurity and the importance of people 

Many if not most breaches have a human factor – someone either accidentally or maliciously does something they should not do which leads to or expedites a breach. The importance of people in the protection of confidential and personal data is often underestimated.  


Assessing compliance: the ISO 27001 ISMS internal audit

Testing and assessing your information security measures is essential to ascertain whether the controls you have implemented are working effectively.

Compliance with the international information security standard ISO 27001 requires continual monitoring and regular reviews of the ISMS. An internal audit is an effective measure to assess whether your ISMS is functioning as it should, and one of the requirements for ISO 27001 certification.


How to overcome your data security compliance challenges

Data security laws throughout Europe are becoming increasingly stringent as the cyber threat landscape constantly evolves. This evolution calls for stronger, smarter and more robust security solutions within organisations.

In this webinar, Sharon O’Reilly, data protection consultant at IT Governance Europe, explains how an ISMS (information security management system) can help mitigate breaches and meet a host of regulations that require information security measures to protect data.


How to implement an information security management system

Implementing an ISMS based on the best-practice guidance set out by ISO 27001 and ISO 27002 delivers numerous benefits, including reducing your risk of a data breach. 


Conducting a cybersecurity risk assessment

ISO 27001 is the international standard that sets out the specification of an ISMS, a best-practice approach to addressing information security that encompasses people, processes, and technology.


Speak to an expert

Our qualified ISO 27001 lead implementers are ready to offer you practical advice about the best approach to take for implementing an ISO 27001 project and discuss different options to suit your budget and business needs.

SAVE 25%