Recognizing the importance of operational security
Rob Acker highlights the importance of operational security both in relation to ISO 27001 and the changing world of work. Download to read his article.
Webinar: The remote workplace - Managing the new threat landscape with ISO 27001
In partnership with Infosecurity Magazine, experts from Lloyd’s Register, U.N. Development Programme, and Nettitude will team up to discuss how the expansion of the remote workplace has created new information security threats.
Webinar: Leveraging ISO 27001 to Manage Cyber & Information Security Risks
In partnership with Infosecurity Magazine, experts from LR, Nettitude, and Motorola come together to offer practical guidance and solutions for effective information security management.
Information Security Solutions Guide
When it comes to information, the threat landscape continually shifts and evolves to keep pace with technological advancement. Download to learn more.
Addressing the hightech and telecoms threat landscape
A gap has developed between the adoption of sophisticated technologies and protection against advanced threats.
Improving cyber risk management with ISO 27001
Download to learn how the information security management system provides a solution.
Making the case for physical security
Here, Rob Acker, Technical Manager Information Security and Business Continuity at Lloyd’s Register, highlights the importance of physical security to achieving ISO 27001 certification, identifying the steps you can take to ensure compliance.
A comprehensive guide to ISO 27001
This article provides some practical guidance and advice for those who have been tasked in gaining certification for their organization with regards to an ISMS.
ISO 27001:2013 Datasheet
ISO 27001 provides a best practice framework to identify, analyze and then implement controls to manage information security risks.
Enhance your Information Security Strategy with ISO 27001:2013
Find out what can you do to ensure your organization’s key information assets stay safe from cyber threats in this complimentary guide which compares the 10 Steps to cyber security.