Achieve Robust Information Security with ISO 27001:2022

Our platform empowers your organisation to align with ISO 27001, ensuring comprehensive security management. This international standard is essential for protecting sensitive data and enhancing resilience against cyber threats. With over 70,000 certificates issued globally, ISO 27001's widespread adoption underscores its importance in safeguarding information assets.

Why ISO 27001 Matters

Achieving ISO 27001:2022 certification emphasises a comprehensive, risk-based approach to improving information security management, ensuring your organisation effectively manages and mitigates potential threats, aligning with modern security needs. It provides a systematic methodology for managing sensitive information, ensuring it remains secure. Certification can reduce data breach costs by 30% and is recognised in over 150 countries, enhancing international business opportunities and competitive advantage.

How ISO 27001 Certification Benefits Your Business

  1. Achieve Cost Efficiency: Save time and money by preventing costly security breaches. Implement proactive risk management measures to significantly reduce the likelihood of incidents.

  2. Accelerate Sales Growth: Streamline your sales process by reducing extensive security documentation requests (RFIs). Showcase your compliance with international information security standards to shorten negotiation times and close deals faster.

  3. Boost Client Trust: Demonstrate your commitment to information security to enhance client confidence and build lasting trust. Increase customer loyalty and retain clients in sectors like finance, healthcare, and IT services.

Comprehensive Guide on How to Implement ISO 27001:2022 Certification

The standard's structure includes a comprehensive Information Security Management System (ISMS) framework and a detailed ISO 27001 implementation guide that integrates risk management processes and Annex A controls. These components create a holistic security strategy, addressing various aspects of security (ISO 27001:2022 Clause 4.2). This approach not only enhances security but also fosters a culture of awareness and compliance within the organisation.

Streamlining Certification with ISMS.online

ISMS.online plays a crucial role in facilitating alignment by offering tools that streamline the certification process. Our platform provides automated risk assessments and real-time monitoring, simplifying the implementation of ISO 27001:2022 requirements. This not only reduces manual effort but also enhances efficiency and accuracy in maintaining alignment.

Join 25000 + Users Achieving ISO 27001 with ISMS.online. Book Your Free Demo Today!


Understanding ISO 27001:2022

ISO 27001 is a pivotal standard for improving an Information Security Management System (ISMS), offering a structured framework to protect sensitive data. This framework integrates comprehensive risk evaluation processes and Annex A controls, forming a robust security strategy. Organisations can effectively identify, analyse, and address vulnerabilities, enhancing their overall security posture.

Key Elements of ISO 27001:2022

  • ISMS Framework: This foundational component establishes systematic policies and procedures for managing information security (ISO 27001:2022 Clause 4.2). It aligns organisational goals with security protocols, fostering a culture of compliance and awareness.

  • Risk Evaluation: Central to ISO 27001, this process involves conducting thorough assessments to identify potential threats. It is essential for implementing appropriate security measures and ensuring continuous monitoring and improvement.

  • ISO 27001 Controls: ISO 27001:2022 outlines a comprehensive set of ISO 27001 controls within Annex A, designed to address various aspects of information security. These controls include measures for access control, cryptography, physical security, and incident management, among others. Implementing these controls ensures your Information Security Management System (ISMS) effectively mitigates risks and safeguards sensitive information.

iso 27001 requirements and structure

Aligning with International Standards

ISO 27001:2022 is developed in collaboration with the International Electrotechnical Commission (IEC), ensuring that the standard aligns with global best practices in information security. This partnership enhances the credibility and applicability of ISO 27001 across diverse industries and regions.

How ISO 27001 Integrates with Other Standards

ISO 27001:2022 seamlessly integrates with other standards like ISO 9001 for quality management, ISO 27002 for code of practice for information security controls and regulations like GDPR, enhancing compliance and operational efficiency. This integration allows organisations to streamline regulatory efforts and align security practices with broader business objectives. Initial preparation involves a gap analysis to identify areas needing improvement, followed by a risk evaluation to assess potential threats. Implementing Annex A controls ensures comprehensive security measures are in place. The final audit process, including Stage 1 and Stage 2 audits, verifies compliance and readiness for certification.

Why Is ISO 27001:2022 Important for Organisations?

ISO 27001 plays a vital role in strengthening your organisation's data protection strategies. It provides a comprehensive framework for managing sensitive information, aligning with contemporary cybersecurity requirements through a risk-based approach. This alignment not only fortifies defences but also ensures adherence to regulations like GDPR, mitigating potential legal risks (ISO 27001:2022 Clause 6.1).

ISO 27001:2022 Integration with Other Standards

ISO 27001 is part of the broader ISO family of management system standards. This allows it to be seamlessly integrated with other standards, such as:

This integrated approach helps your organisation maintain robust operational standards, streamlining the certification process and enhancing compliance.

How Does ISO 27001:2022 Enhance Risk Management?

  • Structured Risk Management: The standard emphasises the systematic identification, assessment, and mitigation of risks, fostering a proactive security posture.
  • Incident Reduction: Organisations experience fewer breaches due to the robust controls outlined in Annex A.
  • Operational Efficiency: Streamlined processes enhance efficiency, reducing the likelihood of costly incidents.

Structured Risk Management with ISO 27001:2022

ISO 27001 requires organisations to adopt a comprehensive, systematic approach to risk management. This includes:

  • Risk Identification and Assessment: Identify potential threats to sensitive data and evaluate the severity and likelihood of those risks (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Select appropriate treatment options, such as mitigating, transferring, avoiding, or accepting risks. With the addition of new options like exploiting and enhancing, organisations can take calculated risks to harness opportunities.

Each of these steps must be reviewed regularly to ensure that the risk landscape is continuously monitored and mitigated as necessary.

What Are the Benefits for Trust and Reputation?

Certification signifies a commitment to data protection, enhancing your business reputation and customer trust. Certified organisations often see a 20% increase in customer satisfaction, as clients appreciate the assurance of secure data handling.

How ISO 27001 Certification Impacts Client Trust and Sales

  1. Increased Client Confidence: When prospective clients see that your organisation is ISO 27001 certified, it automatically elevates their trust in your ability to protect sensitive information. This trust is essential for sectors where data security is a deciding factor, such as healthcare, finance, and government contracting.

  2. Faster Sales Cycles: ISO 27001 certification reduces the time spent answering security questionnaires during the procurement process. Prospective clients will see your certification as a guarantee of high security standards, speeding up decision-making.

  3. Competitive Advantage: ISO 27001 certification positions your company as a leader in information security, giving you an edge over competitors who may not hold this certification.

How Does ISO 27001:2022 Offer Competitive Advantages?

ISO 27001 opens international business opportunities, recognised in over 150 countries. It cultivates a culture of security awareness, positively influencing organisational culture and encouraging continuous improvement and resilience, essential for thriving in today's digital environment.

How Can ISO 27001 Support Regulatory Adherence?

Aligning with ISO 27001 helps navigate complex regulatory landscapes, ensuring adherence to various legal requirements. This alignment reduces potential legal liabilities and enhances overall governance.

Incorporating ISO 27001:2022 into your organisation not only strengthens your data protection framework but also builds a foundation for sustainable growth and trust in the global market.

Free download

Get your guide to
ISO 27001 success

Everything you need to know about achieving ISO 27001 first time

Get your free guide

Enhancing Risk Management with ISO 27001:2022

ISO 27001:2022 offers a robust framework for managing information security risks, vital for safeguarding your organisation's sensitive data. This standard emphasises a systematic approach to risk evaluation, ensuring potential threats are identified, assessed, and mitigated effectively.

How Does ISO 27001 Structure Risk Management?

ISO 27001:2022 integrates risk evaluation into the Information Security Management System (ISMS), involving:

  • Risk Assessment: Conducting thorough evaluations to identify and analyse potential threats and vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Implementing strategies to mitigate identified risks, using controls outlined in Annex A to reduce vulnerabilities and threats.
  • Continuous Monitoring: Regularly reviewing and updating practices to adapt to evolving threats and maintain security effectiveness.

What Techniques and Strategies Are Key?

Effective risk management under ISO 27001:2022 involves:

  • Risk Assessment and Analysis: Utilising methodologies like SWOT analysis and threat modelling to evaluate risks comprehensively.
  • Risk Treatment and Mitigation: Applying controls from Annex A to address specific risks, ensuring a proactive approach to security.
  • Continuous Improvement: Fostering a security-focused culture that encourages ongoing evaluation and enhancement of risk management practices.

How Can the Framework Be Tailored to Your Organisation?

ISO 27001:2022's framework can be customised to fit your organisation's specific needs, ensuring that security measures align with business objectives and regulatory requirements. By fostering a culture of proactive risk management, organisations with ISO 27001 certification experience fewer security breaches and enhanced resilience against cyber threats. This approach not only protects your data but also builds trust with stakeholders, enhancing your organisation's reputation and competitive edge.

Key Changes in ISO 27001:2022

ISO 27001:2022 introduces pivotal updates, enhancing its role in modern cybersecurity. The most significant changes reside in Annex A, which now includes advanced measures for digital security and proactive threat management. These revisions address the evolving nature of security challenges, particularly the increasing reliance on digital platforms.

Key Differences Between ISO 27001:2022 and Earlier Versions

The differences between the 2013 and 2022 versions of ISO 27001 are crucial to understanding the updated standard. While there are no massive overhauls, the refinements in Annex A controls and other areas ensure the standard remains relevant to modern cybersecurity challenges. Key changes include:

  • Restructuring of Annex A Controls: Annex A controls have been condensed from 114 to 93, with some being merged, revised, or newly added. These changes reflect the current cybersecurity environment, making controls more streamlined and focused.
  • New Focus Areas: The 11 new controls introduced in ISO 27001:2022 include areas such as threat intelligence, physical security monitoring, secure coding, and cloud service security, addressing the rise of digital threats and the increased reliance on cloud-based solutions.

Understanding Annex A Controls

  • Enhanced Security Protocols: Annex A now features 93 controls, with new additions focusing on digital security and proactive threat management. These controls are designed to mitigate emerging risks and ensure robust protection of information assets.
  • Digital Security Focus: As digital platforms become integral to operations, ISO 27001:2022 emphasises securing digital environments, ensuring data integrity, and safeguarding against unauthorised access.
  • Proactive Threat Management: New controls enable organisations to anticipate and respond to potential security incidents more effectively, strengthening their overall security posture.

Detailed Breakdown of Annex A Controls in ISO 27001:2022

ISO 27001:2022 introduces a revised set of Annex A controls, reducing the total from 114 to 93 and restructuring them into four main groups. Here’s a breakdown of the control categories:

Control GroupNumber of ControlsExamples
Organisational37Threat intelligence, ICT readiness, information security policies
People8Responsibilities for security, screening
Physical14Physical security monitoring, equipment protection
Technological34Web filtering, secure coding, data leakage prevention

New Controls: ISO 27001:2022 introduces 11 new controls focused on emerging technologies and challenges, including:

  • Cloud services: Security measures for cloud infrastructure.
  • Threat intelligence: Proactive identification of security threats.
  • ICT readiness: Business continuity preparations for ICT systems.

By implementing these controls, organisations ensure they are equipped to handle modern information security challenges.

iso 27002 new controls

Full Table of ISO 27001 Controls

Below is a full list of ISO 27001:2022 controls

ISO 27001:2022 Organisational Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Organisational ControlsAnnex A 5.1Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational ControlsAnnex A 5.2Annex A 6.1.1Information Security Roles and Responsibilities
Organisational ControlsAnnex A 5.3Annex A 6.1.2Segregation of Duties
Organisational ControlsAnnex A 5.4Annex A 7.2.1Management Responsibilities
Organisational ControlsAnnex A 5.5Annex A 6.1.3Contact With Authorities
Organisational ControlsAnnex A 5.6Annex A 6.1.4Contact With Special Interest Groups
Organisational ControlsAnnex A 5.7NEWThreat Intelligence
Organisational ControlsAnnex A 5.8Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational ControlsAnnex A 5.9Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational ControlsAnnex A 5.10Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational ControlsAnnex A 5.11Annex A 8.1.4Return of Assets
Organisational ControlsAnnex A 5.12Annex A 8.2.1Classification of Information
Organisational ControlsAnnex A 5.13Annex A 8.2.2Labelling of Information
Organisational ControlsAnnex A 5.14Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational ControlsAnnex A 5.15Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational ControlsAnnex A 5.16Annex A 9.2.1Identity Management
Organisational ControlsAnnex A 5.17Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational ControlsAnnex A 5.18Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational ControlsAnnex A 5.19Annex A 15.1.1Information Security in Supplier Relationships
Organisational ControlsAnnex A 5.20Annex A 15.1.2Addressing Information Security Within Supplier Agreements
Organisational ControlsAnnex A 5.21Annex A 15.1.3Managing Information Security in the ICT Supply Chain
Organisational ControlsAnnex A 5.22Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational ControlsAnnex A 5.23NEWInformation Security for Use of Cloud Services
Organisational ControlsAnnex A 5.24Annex A 16.1.1Information Security Incident Management Planning and Preparation
Organisational ControlsAnnex A 5.25Annex A 16.1.4Assessment and Decision on Information Security Events
Organisational ControlsAnnex A 5.26Annex A 16.1.5Response to Information Security Incidents
Organisational ControlsAnnex A 5.27Annex A 16.1.6Learning From Information Security Incidents
Organisational ControlsAnnex A 5.28Annex A 16.1.7Collection of Evidence
Organisational ControlsAnnex A 5.29Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational ControlsAnnex A 5.30NEWICT Readiness for Business Continuity
Organisational ControlsAnnex A 5.31Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational ControlsAnnex A 5.32Annex A 18.1.2Intellectual Property Rights
Organisational ControlsAnnex A 5.33Annex A 18.1.3Protection of Records
Organisational ControlsAnnex A 5.34 Annex A 18.1.4Privacy and Protection of PII
Organisational ControlsAnnex A 5.35Annex A 18.2.1Independent Review of Information Security
Organisational ControlsAnnex A 5.36Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational ControlsAnnex A 5.37Annex A 12.1.1Documented Operating Procedures


ISO 27001:2022 People Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
People ControlsAnnex A 6.1Annex A 7.1.1Screening
People ControlsAnnex A 6.2Annex A 7.1.2Terms and Conditions of Employment
People ControlsAnnex A 6.3Annex A 7.2.2Information Security Awareness, Education and Training
People ControlsAnnex A 6.4Annex A 7.2.3Disciplinary Process
People ControlsAnnex A 6.5Annex A 7.3.1Responsibilities After Termination or Change of Employment
People ControlsAnnex A 6.6Annex A 13.2.4Confidentiality or Non-Disclosure Agreements
People ControlsAnnex A 6.7Annex A 6.2.2Remote Working
People ControlsAnnex A 6.8Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting


ISO 27001:2022 Physical Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Physical ControlsAnnex A 7.1Annex A 11.1.1Physical Security Perimeters
Physical ControlsAnnex A 7.2Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical ControlsAnnex A 7.3Annex A 11.1.3Securing Offices, Rooms and Facilities
Physical ControlsAnnex A 7.4NEWPhysical Security Monitoring
Physical ControlsAnnex A 7.5Annex A 11.1.4Protecting Against Physical and Environmental Threats
Physical ControlsAnnex A 7.6Annex A 11.1.5Working In Secure Areas
Physical ControlsAnnex A 7.7Annex A 11.2.9Clear Desk and Clear Screen
Physical ControlsAnnex A 7.8Annex A 11.2.1Equipment Siting and Protection
Physical ControlsAnnex A 7.9Annex A 11.2.6Security of Assets Off-Premises
Physical ControlsAnnex A 7.10Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical ControlsAnnex A 7.11Annex A 11.2.2Supporting Utilities
Physical ControlsAnnex A 7.12Annex A 11.2.3Cabling Security
Physical ControlsAnnex A 7.13Annex A 11.2.4Equipment Maintenance
Physical ControlsAnnex A 7.14Annex A 11.2.7Secure Disposal or Re-Use of Equipment


ISO 27001:2022 Technological Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Technological ControlsAnnex A 8.1Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological ControlsAnnex A 8.2Annex A 9.2.3Privileged Access Rights
Technological ControlsAnnex A 8.3Annex A 9.4.1Information Access Restriction
Technological ControlsAnnex A 8.4Annex A 9.4.5Access to Source Code
Technological ControlsAnnex A 8.5Annex A 9.4.2Secure Authentication
Technological ControlsAnnex A 8.6Annex A 12.1.3Capacity Management
Technological ControlsAnnex A 8.7Annex A 12.2.1Protection Against Malware
Technological ControlsAnnex A 8.8Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological ControlsAnnex A 8.9NEWConfiguration Management
Technological ControlsAnnex A 8.10NEWInformation Deletion
Technological ControlsAnnex A 8.11NEWData Masking
Technological ControlsAnnex A 8.12NEWData Leakage Prevention
Technological ControlsAnnex A 8.13Annex A 12.3.1Information Backup
Technological ControlsAnnex A 8.14Annex A 17.2.1Redundancy of Information Processing Facilities
Technological ControlsAnnex A 8.15Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological ControlsAnnex A 8.16NEWMonitoring Activities
Technological ControlsAnnex A 8.17Annex A 12.4.4Clock Synchronization
Technological ControlsAnnex A 8.18Annex A 9.4.4Use of Privileged Utility Programs
Technological ControlsAnnex A 8.19Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological ControlsAnnex A 8.20Annex A 13.1.1Networks Security
Technological ControlsAnnex A 8.21Annex A 13.1.2Security of Network Services
Technological ControlsAnnex A 8.22Annex A 13.1.3Segregation of Networks
Technological ControlsAnnex A 8.23NEWWeb filtering
Technological ControlsAnnex A 8.24Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological ControlsAnnex A 8.25Annex A 14.2.1Secure Development Life Cycle
Technological ControlsAnnex A 8.26Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological ControlsAnnex A 8.27Annex A 14.2.5Secure System Architecture and Engineering Principles
Technological ControlsAnnex A 8.28NEWSecure Coding
Technological ControlsAnnex A 8.29Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological ControlsAnnex A 8.30Annex A 14.2.7Outsourced Development
Technological ControlsAnnex A 8.31Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological ControlsAnnex A 8.32Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological ControlsAnnex A 8.33Annex A 14.3.1Test Information
Technological ControlsAnnex A 8.34Annex A 12.7.1Protection of Information Systems During Audit Testing


Navigating Implementation Challenges

Organisations may face challenges such as resource constraints and insufficient management support when implementing these updates. Effective resource allocation and stakeholder engagement are crucial for maintaining momentum and achieving successful compliance. Regular training sessions can help clarify the standard's requirements, reducing compliance challenges.

Adapting to Evolving Security Threats

These updates demonstrate ISO 27001:2022's adaptability to the changing security environment, ensuring organisations remain resilient against new threats. By aligning with these enhanced requirements, your organisation can bolster its security framework, improve compliance processes, and maintain a competitive edge in the global market.


How Can Organisations Successfully Attain ISO 27001 Certification?

Achieving ISO 27001:2022 requires a methodical approach, ensuring your organisation aligns with the standard's comprehensive requirements. Here's a detailed guide to navigate this process effectively:

Kickstart Your Certification with a Thorough Gap Analysis

Identify improvement areas with a comprehensive gap analysis. Assess current practices against ISO 27001 standard to pinpoint discrepancies. Develop a detailed project plan outlining objectives, timelines, and responsibilities. Engage stakeholders early to secure buy-in and allocate resources efficiently.

Implement an Effective ISMS

Establish and implement an Information Security Management System (ISMS) tailored to your organisational goals. Implement the 93 Annex A controls, emphasising risk assessment and treatment (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and enhancing precision.

Perform Regular Internal Audits

Conduct regular internal audits to evaluate the effectiveness of your ISMS. Management reviews are essential for performance evaluation and necessary adjustments (ISO 27001:2022 Clause 9.3). ISMS.online facilitates real-time collaboration, boosting team efficiency and audit readiness.

Engage with Certification Bodies

Select an accredited certification body and schedule the audit process, including Stage 1 and Stage 2 audits. Ensure all documentation is complete and accessible. ISMS.online offers templates and resources to simplify documentation and track progress.

Overcome Common Challenges with a Free Consultation

Overcome resource constraints and resistance to change by fostering a culture of security awareness and continuous improvement. Our platform supports maintaining alignment over time, aiding your organisation in achieving and sustaining certification.

Schedule a free consultation to address resource constraints and navigate resistance to change. Learn how ISMS.online can support your implementation efforts and ensure successful certification.

ISO 27001:2022 and Supplier Relationships Requirements

ISO 27001:2022 has introduced new requirements to ensure organisations maintain robust supplier and third-party management programs. This includes:

  • Identifying and Assessing Suppliers: Organisations must identify and analyse third-party suppliers that impact information security. A thorough risk assessment for each supplier is mandatory to ensure compliance with your ISMS.
  • Supplier Security Controls: Ensure that your suppliers implement adequate security controls and that these are regularly reviewed. This extends to ensuring that customer service levels and personal data protection are not adversely affected.
  • Auditing Suppliers: Organisations should audit their suppliers' processes and systems regularly. This aligns with the new ISO 27001:2022 requirements, ensuring that supplier compliance is maintained and that risks from third-party partnerships are mitigated.

Enhanced Employee Cybersecurity Awareness

ISO 27001:2022 continues to emphasise the importance of employee awareness. Implementing policies for ongoing education and training is critical. This approach ensures that your employees are not only aware of security risks but are also capable of actively participating in mitigating those risks.

  • Human Error Prevention: Businesses should invest in training programs that aim to prevent human error, one of the leading causes of security breaches.
  • Clear Policy Development: Establish clear guidelines for employee conduct regarding data security. This includes awareness programs on phishing, password management, and mobile device security.
  • Security Culture: Foster a security-aware culture where employees feel empowered to raise concerns about cybersecurity threats. An environment of openness helps organisations tackle risks before they materialise into incidents.

ISO 27001:2022 Requirements for Human Resource Security

One of the essential refinements in ISO 27001:2022 is its expanded focus on human resource security. This involves:

  • Personnel Screening: Clear guidelines for personnel screening before hiring are crucial to ensuring that employees with access to sensitive information meet required security standards.
  • Training and Awareness: Ongoing education is required to ensure that staff are fully aware of the organisation's security policies and procedures.
  • Disciplinary Actions: Define clear consequences for policy violations, ensuring that all employees understand the importance of complying with security requirements.

These controls ensure that organisations manage both internal and external personnel security risks effectively.

Compliance doesn’t have to be complicated.

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

Employee Awareness Programs and Security Culture

Fostering a culture of security awareness is crucial for maintaining strong defences against evolving cyber threats. ISO 27001:2022 promotes ongoing training and awareness programs to ensure that all employees, from leadership to staff, are involved in upholding information security standards.

  • Phishing Simulations and Security Drills: Conducting regular security drills and phishing simulations helps ensure employees are prepared to handle cyber incidents.
  • Interactive Workshops: Engage employees in practical training sessions that reinforce key security protocols, improving overall organisational awareness.

Continual Improvement and Cybersecurity Culture

Finally, ISO 27001:2022 advocates for a culture of continual improvement, where organisations consistently evaluate and update their security policies. This proactive stance is integral to maintaining compliance and ensuring the organisation stays ahead of emerging threats.

  • Security Governance: Regular updates to security policies and audits of cybersecurity practices ensure ongoing compliance with ISO 27001:2022.
  • Proactive Risk Management: Encouraging a culture that prioritises risk assessment and mitigation allows organisations to stay responsive to new cyber threats.

Optimal Timing for ISO 27001 Adoption

Adopting ISO 27001:2022 is a strategic decision that depends on your organisation's readiness and objectives. The ideal timing often aligns with periods of growth or digital transformation, where enhancing security frameworks can significantly improve business outcomes. Early adoption provides a competitive edge, as certification is recognised in over 150 countries, expanding international business opportunities.

Conducting a Readiness Assessment

To ensure a seamless adoption, conduct a thorough readiness assessment to evaluate current security practices against the updated standard. This involves:

  • Gap Analysis: Identify areas needing improvement and align them with ISO 27001:2022 requirements.
  • Resource Allocation: Ensure adequate resources, including personnel, technology, and budget, are available to support the adoption.
  • Stakeholder Engagement: Secure buy-in from key stakeholders to facilitate a smooth adoption process.

Aligning Certification with Strategic Goals

Aligning certification with strategic goals enhances business outcomes. Consider:

  • Timeline and Deadlines: Be aware of industry-specific deadlines for compliance to avoid penalties.
  • Continuous Improvement: Foster a culture of ongoing evaluation and enhancement of security practices.

Utilising ISMS.online for Effective Management

Our platform, ISMS.online, plays a vital role in managing the adoption effectively. It offers tools for automating compliance tasks, reducing manual effort, and providing real-time collaboration features. This ensures your organisation can maintain compliance and track progress efficiently throughout the adoption process.

By strategically planning and utilising the right tools, your organisation can navigate the adoption of ISO 27001:2022 smoothly, ensuring robust security and compliance.

Where Does ISO 27001:2022 Align with Other Regulatory Standards?

ISO 27001 plays a significant role in aligning with key regulatory frameworks, such as GDPR and NIS 2, to enhance data protection and streamline regulatory adherence. This alignment not only strengthens data privacy but also improves organisational resilience across multiple frameworks.

How Does ISO 27001:2022 Enhance GDPR Compliance?

ISO 27001:2022 complements GDPR by focusing on data protection and privacy through its comprehensive risk management processes (ISO 27001:2022 Clause 6.1). The standard's emphasis on safeguarding personal data aligns with GDPR's stringent requirements, ensuring robust data protection strategies.

What Role Does ISO 27001:2022 Play in Supporting NIS 2 Directives?

The standard supports NIS 2 directives by enhancing cybersecurity resilience. ISO 27001:2022's focus on threat intelligence and incident response aligns with NIS 2's objectives, fortifying organisations against cyber threats and ensuring continuity of critical services.

How Does ISO 27001:2022 Integrate with Other ISO Standards?

ISO 27001 integrates effectively with other ISO standards, such as ISO 9001 and ISO 14001, creating synergies that enhance overall regulatory alignment and operational efficiency. This integration facilitates a unified approach to managing quality, environmental, and security standards within an organisation.

How Can Organisations Achieve Comprehensive Regulatory Alignment with ISO 27001:2022?

Organisations can achieve comprehensive regulatory alignment by synchronising their security practices with broader requirements. Our platform, ISMS.online, offers extensive certification support, providing tools and resources to simplify the process. Industry associations and webinars further enhance understanding and implementation, ensuring organisations remain compliant and competitive.

Can ISO 27001:2022 Effectively Mitigate New Security Challenges?

Emerging threats, including cyber-attacks and data breaches, necessitate robust strategies. ISO 27001:2022 offers a comprehensive framework for managing risks, emphasising a risk-based approach to identify, assess, and mitigate potential threats.

How Does ISO 27001:2022 Enhance Cyber Threat Mitigation?

ISO 27001:2022 strengthens mitigation through structured risk management processes. By implementing Annex A controls, organisations can proactively address vulnerabilities, reducing cyber incidents. This proactive stance builds trust with clients and partners, differentiating businesses in the market.

What Measures Ensure Cloud Security with ISO 27001:2022?

Cloud security challenges are prevalent as organisations migrate to digital platforms. ISO 27001:2022 includes specific controls for cloud environments, ensuring data integrity and safeguarding against unauthorised access. These measures foster customer loyalty and enhance market share.

How Does ISO 27001:2022 Prevent Data Breaches?

Data breaches pose significant risks, impacting reputation and financial stability. ISO 27001:2022 establishes comprehensive protocols, ensuring continuous monitoring and improvement. Certified organisations often experience fewer breaches, maintaining effective security measures.

How Can Organisations Adapt to Evolving Threat Landscapes?

Organisations can adapt ISO 27001:2022 to evolving threats by regularly updating security practices. This adaptability ensures alignment with emerging threats, maintaining robust defences. By demonstrating a commitment to security, certified organisations gain a competitive edge and are preferred by clients and partners.

Cultivating a Security Culture with ISO 27001 Compliance

ISO 27001 serves as a cornerstone in developing a robust security culture by emphasising awareness and comprehensive training. This approach not only fortifies your organisation’s security posture but also aligns with current cybersecurity standards.

How to Enhance Security Awareness and Training

Security awareness is integral to ISO 27001:2022, ensuring your employees understand their roles in protecting information assets. Tailored training programmes empower staff to recognise and respond to threats effectively, minimising incident risks.

What Are Effective Training Strategies?

Organisations can enhance training by:

  • Interactive Workshops: Conduct engaging sessions that reinforce security protocols.
  • E-Learning Modules: Provide flexible online courses for continuous learning.
  • Simulated Exercises: Implement phishing simulations and incident response drills to test readiness.

How Does Leadership Influence Security Culture?

Leadership plays a pivotal role in embedding a security-focused culture. By prioritising security initiatives and leading by example, management instils responsibility and vigilance throughout the organisation, making security integral to the organisational ethos.

What Are the Long-Term Benefits of Security Awareness?

ISO 27001:2022 offers sustained improvements and risk reduction, enhancing credibility and providing a competitive edge. Organisations report increased operational efficiency and reduced costs, supporting growth and opening new opportunities.

How Does ISMS.online Support Your Security Culture?

Our platform, ISMS.online, aids organisations by offering tools for tracking training progress and facilitating real-time collaboration. This ensures that security awareness is maintained and continuously improved, aligning with ISO 27001:2022's objectives.

We'll guide you every step of the way

Our built-in tool takes you from set-up to certification with a 100% success rate.

Book a demo

Navigating Challenges in ISO 27001:2022 Implementation

Implementing ISO 27001:2022 involves overcoming significant challenges, such as managing limited resources and addressing resistance to change. These hurdles must be addressed to achieve certification and enhance your organisation's information security posture.

Identifying Common Implementation Hurdles

Organisations often face difficulties in allocating adequate resources, both financial and human, to meet ISO 27001:2022's comprehensive requirements. Resistance to adopting new security practices can also impede progress, as employees may be hesitant to alter established workflows.

Efficient Resource Management Strategies

To optimise resource management, prioritise tasks based on risk assessment outcomes, focusing on high-impact areas (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and ensuring critical areas receive the necessary attention.

Overcoming Resistance to Change

Effective communication and training are key to mitigating resistance. Engage employees in the implementation process by highlighting the benefits of ISO 27001:2022, such as enhanced data protection and GDPR alignment. Regular training sessions can foster a culture of security awareness and compliance.

Enhancing Implementation with ISMS.online

ISMS.online plays a pivotal role in overcoming these challenges by providing tools that enhance collaboration and streamline documentation. Our platform supports integrated compliance strategies, aligning ISO 27001 with standards like ISO 9001, thereby improving overall efficiency and regulatory adherence. By simplifying the implementation process, ISMS.online helps your organisation achieve and maintain ISO 27001:2022 certification effectively.

What are Key Differences Between ISO 27001:2022 and Earlier Versions

ISO 27001:2022 introduces pivotal updates to meet evolving security demands, enhancing its relevance in today's digital environment. A significant change is the expansion of Annex A controls, now totaling 93, which include new measures for cloud security and threat intelligence. These additions underscore the growing importance of digital ecosystems and proactive threat management.

Impact on Compliance and Certification

The updates in ISO 27001:2022 require adjustments in compliance processes. Your organisation must integrate these new controls into its Information Security Management Systems (ISMS), ensuring alignment with the latest requirements (ISO 27001:2022 Clause 6.1). This integration streamlines certification by providing a comprehensive framework for managing information risks.

New Controls and Their Significance

The introduction of controls focused on cloud security and threat intelligence is noteworthy. These controls help your organisation protect data in complex digital environments, addressing vulnerabilities unique to cloud systems. By implementing these measures, you can enhance your security posture and reduce the risk of data breaches.

Adapting to New Requirements

To adapt to these changes, your organisation should conduct a thorough gap analysis to identify areas needing improvement. This involves assessing current practices against the updated standard, ensuring alignment with new controls. By using platforms like ISMS.online, you can automate compliance tasks, reducing manual effort and enhancing efficiency.

These updates highlight ISO 27001:2022's commitment to addressing contemporary security challenges, ensuring your organisation remains resilient against emerging threats.


Why Should Compliance Officers Prioritise ISO 27001:2022?

ISO 27001:2022 is pivotal for compliance officers seeking to enhance their organisation's information security framework. Its structured methodology for regulatory adherence and risk management is indispensable in today's interconnected environment.

Navigating Regulatory Frameworks

ISO 27001:2022 aligns with global standards like GDPR, providing a comprehensive framework that ensures data protection and privacy. By adhering to its guidelines, you can confidently navigate complex regulatory landscapes, reducing legal risks and enhancing governance (ISO 27001:2022 Clause 6.1).

Proactive Risk Management

The standard's risk-based approach enables organisations to systematically identify, assess, and mitigate risks. This proactive stance minimises vulnerabilities and fosters a culture of continuous improvement, essential for maintaining a robust security posture. Compliance officers can utilise ISO 27001:2022 to implement effective risk treatment strategies, ensuring resilience against emerging threats.

Enhancing Organisational Security

ISO 27001:2022 significantly enhances your organisation's security posture by embedding security practices into core business processes. This integration boosts operational efficiency and builds trust with stakeholders, positioning your organisation as a leader in information security.

Effective Implementation Strategies

Compliance officers can implement ISO 27001:2022 effectively by utilising platforms like ISMS.online, which streamline efforts through automated risk assessments and real-time monitoring. Engaging stakeholders and fostering a security-aware culture are crucial steps in embedding the standard's principles across your organisation.

By prioritising ISO 27001:2022, you not only safeguard your organisation's data but also drive strategic advantages in a competitive market.


How Does ISO 27001:2022 Enhance Security Frameworks?

p>ISO 27001:2022 establishes a comprehensive framework for managing information security, focusing on a risk-based approach. This approach allows your organisation to systematically identify, assess, and address potential threats, ensuring robust protection of sensitive data and adherence to international standards.

Key Strategies for Threat Mitigation

  • Conducting Risk Assessments: Thorough evaluations identify vulnerabilities and potential threats (ISO 27001:2022 Clause 6.1), forming the basis for targeted security measures.
  • Implementing Security Controls: Annex A controls are utilised to address specific risks, ensuring a holistic approach to threat prevention.
  • Continuous Monitoring: Regular reviews of security practices allow adaptation to evolving threats, maintaining the effectiveness of your security posture.

Data Protection and Privacy Alignment

ISO 27001:2022 integrates security practices into organisational processes, aligning with regulations like GDPR. This ensures that personal data is handled securely, reducing legal risks and enhancing stakeholder trust.

Building a Proactive Security Culture

By fostering security awareness, ISO 27001:2022 promotes continuous improvement and vigilance. This proactive stance minimises vulnerabilities and strengthens your organisation's overall security posture. Our platform, ISMS.online, supports these efforts with tools for real-time monitoring and automated risk assessments, positioning your organisation as a leader in information security.

Incorporating ISO 27001:2022 into your security strategy not only fortifies defences but also enhances your organisation's reputation and competitive advantage.


What Advantages Does ISO 27001:2022 Offer to CEOs?

ISO 27001:2022 is a strategic asset for CEOs, enhancing organisational resilience and operational efficiency through a risk-based methodology. This standard aligns security protocols with business objectives, ensuring robust information security management.

How Does ISO 27001:2022 Enhance Strategic Business Integration?

  • Risk Management Framework: ISO 27001:2022 provides a comprehensive framework for identifying and mitigating risks, safeguarding your assets, and ensuring business continuity.
  • Regulatory Compliance Standards: By aligning with global standards like GDPR, it minimises legal risks and strengthens governance, essential for maintaining market trust.

What Are the Competitive Advantages of ISO 27001:2022?

  • Reputation Enhancement: Certification demonstrates a commitment to security, boosting customer trust and satisfaction. Organisations often report increased client confidence, leading to higher retention rates.
  • Global Market Access: With acceptance in over 150 countries, ISO 27001:2022 facilitates entry into international markets, offering a competitive edge.

How Can ISO 27001:2022 Drive Business Growth?

  • Operational Efficiency: Streamlined processes reduce security incidents, lowering costs and improving efficiency.
  • Innovation and Digital Transformation: By fostering a culture of security awareness, it supports digital transformation and innovation, driving business growth.

Integrating ISO 27001:2022 into your strategic planning aligns security measures with organisational goals, ensuring they support broader business objectives. Our platform, ISMS.online, simplifies compliance, offering tools for real-time monitoring and risk management, ensuring your organisation remains secure and competitive.


How to Facilitate Digital Transformation with ISO 27001:2022

ISO 27001:2022 provides a comprehensive framework for organisations transitioning to digital platforms, ensuring data protection and adherence to international standards. This standard is pivotal in managing digital risks and enhancing security measures.

How to Manage Digital Risks Effectively

ISO 27001:2022 offers a risk-based approach to identify and mitigate vulnerabilities. By conducting thorough risk assessments and implementing Annex A controls, your organisation can proactively address potential threats and maintain robust security measures. This approach aligns with evolving cybersecurity requirements, ensuring your digital assets are safeguarded.

How to Foster Secure Digital Innovation

Integrating ISO 27001:2022 into your development lifecycle ensures security is prioritised from design to deployment. This reduces breach risks and enhances data protection, allowing your organisation to pursue innovation confidently while maintaining compliance.

How to Build a Culture of Digital Security

Promoting a culture of security involves emphasising awareness and training. Implement comprehensive programmes that equip your team with the skills needed to recognise and respond to digital threats effectively. This proactive stance fosters a security-conscious environment, essential for successful digital transformation.

By adopting ISO 27001:2022, your organisation can navigate digital complexities, ensuring security and compliance are integral to your strategies. This alignment not only protects sensitive information but also enhances operational efficiency and competitive advantage.


What are the Key Considerations for Implementing ISO 27001:2022

Implementing ISO 27001:2022 involves meticulous planning and resource management to ensure successful integration. Key considerations include strategic resource allocation, engaging key personnel, and fostering a culture of continuous improvement.

Strategic Resource Allocation

Prioritising tasks based on comprehensive risk assessments is essential. Your organisation should focus on high-impact areas, ensuring they receive adequate attention as outlined in ISO 27001:2022 Clause 6.1. Utilising platforms like ISMS.online can automate tasks, reducing manual effort and optimising resource use.

Engaging Key Personnel

Securing buy-in from key personnel early in the process is vital. This involves fostering collaboration and aligning with organisational goals. Clear communication of the benefits and objectives of ISO 27001:2022 helps mitigate resistance and encourages active participation.

Fostering a Culture of Continuous Improvement

Regularly reviewing and updating your Information Security Management Systems (ISMS) to adapt to evolving threats is crucial. This involves conducting periodic audits and management reviews to identify areas for enhancement, as specified in ISO 27001:2022 Clause 9.3.

Steps for Successful Implementation

To ensure successful implementation, your organisation should:

  • Conduct a gap analysis to identify areas needing improvement.
  • Develop a comprehensive project plan with clear objectives and timelines.
  • Utilise tools and resources, such as ISMS.online, to streamline processes and enhance efficiency.
  • Foster a culture of security awareness through regular training and communication.

By addressing these considerations, your organisation can effectively implement ISO 27001:2022, enhancing its security posture and ensuring alignment with international standards.

Get an 81% headstart

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

Start your ISO 27001:2022 journey with ISMS.online. Schedule a personalised demo now to see how our comprehensive solutions can simplify your compliance and streamline your implementation processes. Enhance your security framework and boost operational efficiency with our cutting-edge tools.

How Can ISMS.online Streamline Your Compliance Journey?

  • Automate and Simplify Tasks: Our platform reduces manual effort and enhances precision through automation. The intuitive interface guides you step-by-step, ensuring all necessary criteria are met efficiently.
  • What Support Does ISMS.online Offer?: With features like automated risk assessments and real-time monitoring, ISMS.online helps maintain a robust security posture. Our solution aligns with ISO 27001:2022's risk-based approach, proactively addressing vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Why Schedule a Personalised Demo?: Discover how our solutions can transform your strategy. A personalised demo illustrates how ISMS.online can meet your organisation's specific needs, offering insights into our capabilities and benefits.

How Does ISMS.online Enhance Collaboration and Efficiency?

Our platform fosters seamless teamwork, enabling your organisation to achieve ISO 27001:2022 certification. By utilising ISMS.online, your team can enhance its security framework, improve operational efficiency, and gain a competitive edge. Book a demo today to experience the transformative power of ISMS.online and ensure your organisation remains secure and compliant.


Jump to topic

Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

ISMS Platform Tour

Interested in an ISMS.online platform tour?

Start your free 2-minute interactive demo now and experience the magic of ISMS.online in action!

Try it for free

Related Topics

ISO 27001

Securing Open Source in 2025 and Beyond: A Roadmap for Progress

It's been over three years since Log4Shell, a critical vulnerability in a little-known open-source library, was discovered. With a CVSS score of 10, its relative ubiquity and ease of exploitation singled it out as one of the most serious software flaws of the decade. But even years after it was patched, more than one in 10 downloads of the popular utility are of vulnerable versions. Something is clearly wrong somewhere. A new report from the Linux Foundation has some useful insight into the systemic challenges facing the open-source ecosystem and its users. Unfortunately, there are no easy solutions, but end users can at least mitigate some of the more common risks through industry best practices. A Catastrophic Case Study Open-source software components are everywhere—even proprietary code developers rely on them to accelerate DevOps processes. According to one estimate, 96% of all codebases contain open-source components, and three-quarters contain high-risk open-source vulnerabilities. Given that approaching seven trillion components were downloaded in 2024, this presents a massive potential risk to systems across the globe. Log4j is an excellent case study of what can go wrong. It highlights a major visibility challenge in that software doesn't just contain "direct dependencies" – i.e., open source components that a program explicitly references—but also transitive dependencies. The latter are not imported directly into a project but are used indirectly by a software component. In effect, they're dependencies of direct dependencies. As Google explained at the time, this was the reason why so many Log4j instances were not discovered. "The deeper the vulnerability is in a dependency chain, the more steps are required for it to be fixed," it noted. Sonatype CTO Brian Fox explains that "poor dependency management" in firms is a major source of open-source cybersecurity risk. "Log4j is a great example. We found 13% of Log4j downloads are of vulnerable versions, and this is three years after Log4Shell was patched," he tells ISMS.online. "This is not an issue unique to Log4j either – we calculated that in the last year, 95% of vulnerable components downloaded had a fixed version already available." However, open source risk isn't just about potential vulnerabilities appearing in hard-to-find components. Threat actors are also actively planting malware in some open-source components, hoping they will be downloaded. Sonatype discovered 512,847 malicious packages in the main open-source ecosystems in 2024, a 156% annual increase. Systemic Challenges Log4j was just the tip of the iceberg in many ways, as a new Linux report reveals. It points to several significant industry-wide challenges with open-source projects: Legacy tech: Many developers continue to rely on Python 2, even though Python 3 was introduced in 2008. This creates backwards incompatibility issues and software for which patches are no longer available. Older versions of software packages also persist in ecosystems because their replacements often contain new functionality, which makes them less attractive to users. A lack of standardised naming schema: Naming conventions for software components are "unique, individualised, and inconsistent", limiting initiatives to improve security and transparency. A limited pool of contributors: "Some widely used OSS projects are maintained by a single individual. When reviewing the top 50 non-npm projects, 17% of projects had one developer, and 40% had one or two developers who accounted for at least 80% of the commits," OpenSSF director of open source supply chain security, David Wheeler tells ISMS.online. "A project with a single developer has a greater risk of later abandonment. In addition, they have a greater risk of neglect or malicious code insertion, as they may lack regular updates or peer reviews." Cloud-specific libraries: This could create dependencies on cloud vendors, possible security blind spots, and vendor lock-in. "The biggest takeaway is that open source is continuing to increase in criticality for the software powering cloud infrastructure," says Sonatype's Fox. "There has been 'hockey stick' growth in terms of open source usage, and that trend will only continue. At the same time, we have not seen support, financial or otherwise, for open source maintainers grow to match this consumption." Memory-unsafe languages: The adoption of the memory-safe Rust language is growing, but many developers still favour C and C++, which often contain memory safety vulnerabilities. How ISO 27001 Can Help As Red Hat contributor Herve Beraud notes, we should have seen Log4Shell coming because the utility itself (Log4j) had not undergone regular security audits and was maintained only by a small volunteer team, a risk highlighted above. He argues that developers need to think more carefully about the open-source components they use by asking questions about RoI, maintenance costs, legal compliance, compatibility, adaptability, and, of course, whether they're regularly tested for vulnerabilities. Experts also recommend software composition analysis (SCA) tools to enhance visibility into open-source components. These help organisations maintain a programme of continuous evaluation and patching. Better still, consider a more holistic approach that also covers risk management across proprietary software. The ISO 27001 standard delivers a structured framework to help organisations enhance their open-source security posture. This includes help with: Risk assessments and mitigations for open source software, including vulnerabilities or lack of support Maintaining an inventory of open-source software to help ensure all components are up-to-date and secure Access controls so that only authorised team members can use or modify open-source software Security policies and procedures on the use, monitoring and updating of components Supplier relationship management to ensure open source software providers adhere to the security standards and practices Continuous patch management to address security vulnerabilities in open-source software Incident management processes, including detection and response to vulnerabilities or breaches stemming from open-source Promotion of a continuous improvement culture to enhance the effectiveness of security controls Training and awareness for employees to understand the risks associated with open-source software There's plenty more that can also be done, including government bug bounty programmes, education efforts and community funding from tech giants and other large enterprise users of open source. This problem will not be solved overnight, but at least the wheels have started turning.
Read More
ISO 27001

Winter Watches: Our 6 Favourite ISMS.online Webinars of 2024

In 2024, we saw cyber threats increase, data breach costs rise to record levels, and regulatory restrictions tighten as regulations like NIS 2 and the EU AI Act came into effect. Implementing a robust information security strategy is no longer a nice-to-have for organisations, but a mandatory requirement. Applying information security best practices helps businesses mitigate the risk of cyber incidents, avoid costly regulatory fines, and grow customer trust by securing sensitive information. Our top six favourite webinars in our ‘Winter Watches’ series are a must-watch for businesses looking to boost their information security compliance. Covering everything from transitioning to the latest ISO 27001 update to navigating NIS 2 and DORA, these key webinars offer top tips and vital advice from industry experts on establishing, managing, and continuously improving your information security management. Whether you need guidance on implementing the new ISO 42001 standard, support transitioning from ISO 27001:2013 to ISO 27001:2022 or advice on complying with new or upcoming regulations, our top webinars offer advice to help you along the path to success. Transitioning to ISO 27001:2022: Key Changes and Effective Strategies In October 2025, the transition period between the ISO 27001:2013 standard and the latest ISO 27001:2022 standard ends. For organisations certified to the 2013 iteration of ISO 27001, making the switch to compliance with the latest version of the standard can seem daunting. In ‘Transitioning to ISO 27001:2022’, our expert speakers discuss the changes introduced by the new standards and offer guidance on effectively transitioning from the 2013 to 2022 version. Toby Cane, Sam Peters and Christopher Gill provide practical advice on successfully implementing ISO 27001:2022 within your business, discussing: The core changes to the standard, including revised requirements and new Annex A controls The steps you need to take to maintain compliance with ISO 27001:2022 How to build a transition strategy that reduces disruption and ensures a smooth migration to the new standard. This webinar is essential viewing for information security professionals, compliance officers and ISMS decision-makers ahead of the mandatory transition deadline, with under a year to go. Watch Now ISO 42001 Explained: Unlocking Secure AI Management In Your Business Last December, the International Organisation for Standardisation released ISO 42001, the groundbreaking framework designed to help businesses ethically develop and deploy systems powered by artificial intelligence (AI). The ‘ISO 42001 Explained’ webinar provides viewers with an in-depth understanding of the new ISO 42001 standard and how it applies to their organisation. You’ll learn how to ensure your business’s AI initiatives are responsible, ethical and aligned with global standards as new AI-specific regulations continue to be developed across the globe. Our host Toby Cane is joined by Lirim Bllaca, Powell Jones, Iain McIvor and Alan Baldwin. Together, they break down the core principles of ISO 42001 and cover everything you need to know about the AI management standard and the AI regulatory landscape, including: A deep dive into the structure of ISO 42001, including its scope, purpose and core principles The unique challenges and opportunities presented by AI and the impact of AI on your organisation’s regulatory compliance An actionable roadmap for ISO 42001 compliance. Gain a clear understanding of the ISO 42001 standard and ensure your AI initiatives are responsible using insights from our panel of experts. Watch Now Mastering NIS 2 Compliance: A Practical Approach with ISO 27001 The European Union’s NIS 2 Directive entered into force in October, bringing stricter cybersecurity and reporting requirements for businesses across the EU. Does your business comply with the new regulation? In our in-depth ‘Mastering NIS 2 Compliance: A Practical Approach with ISO 27001’ webinar, we break down the new regulation and how the ISO 27001 framework can provide a roadmap to successful NIS 2 compliance. Our panel of compliance experts Toby Cane, Luke Dash, Patrick Sullivan and Arian Sheremeti discuss how organisations affected by NIS 2 can ensure they meet requirements. You’ll learn: The key provisions of the NIS 2 Directive and how they impact your business How ISO 27001 maps to NIS 2 requirements for more efficient compliance How to conduct risk assessments, develop incident response plans and implement security controls for robust compliance. Gain a deeper understanding of NIS 2 requirements and how ISO 27001 best practices can help you efficiently, effectively comply: Watch Now Securing Your Cloud Setup: Unlocking the Power of ISO 27017 & 27018 Compliance Cloud adoption is accelerating, but with 24% of organisations experiencing cloud security incidents last year, standards like ISO 27017 and ISO 27018 are essential for ensuring security, privacy, and long-term business competitiveness. In our webinar, expert speakers Toby Cane, Chris Gill, Iain McIvor and Alan Baldwin explain how these standards can strengthen your organisation’s security posture to reinforce cloud security and enable strategic growth. You’ll discover: What the ISO 27017 and ISO 27018 standards cover, including their scope and objectives Insight into the risks associated with cloud services and how implementing security and privacy controls can mitigate these risks The security and privacy controls to prioritise for NIS 2 compliance. Discover actionable takeaways and top tips from experts to help you improve your organisation’s cloud security stance: Watch Now Building Digital Trust: An ISO 27001 Approach to Managing Cybersecurity Risks Recent McKinsey research showing that digital trust leaders will see annual growth rates of at least 10% on their top and bottom lines. Despite this, the 2023 PwC Digital Trust Report found that just 27% of senior leaders believe their current cybersecurity strategies will enable them to achieve digital trust. Our ‘Building Digital Trust: An ISO 27001 Approach to Managing Security Risks’ webinar explores the challenges and opportunities for building digital trust, with a focus on how ISO 27001, the information security standard, can help. Our expert panel, Toby Cane and Gillian Welch, share practical advice and key steps for businesses looking to establish and maintain digital trust. In the 45-minute session, you’ll learn: Best practices for building and maintaining digital trust, including using ISO 27001 The importance of digital trust for businesses How cyber attacks and data breaches impact digital trust. Aimed at CEOs, board members and cybersecurity professionals, this vital webinar provides key insights into the importance of digital trust and how to build and maintain it in your organisation: Watch Now Navigating DORA Compliance with ISO 27001: A Roadmap to Digital Resilience The Digital Operational Resilience Act (DORA) comes into effect in January 2025 and is set to redefine how the financial sector approaches digital security and resilience. With requirements focused on strengthening risk management and enhancing incident response capabilities, the regulation adds to the compliance demands impacting an already highly regulated sector. Financial institutions’ need for a robust compliance strategy and increased digital resilience has never been greater. In ‘Navigating DORA Compliance with ISO 27001: A Roadmap to Digital Resilience’, speakers Toby Cane, Luke Sharples and Arian Sheremeti discuss how leveraging the ISO 27001 standard can help your organisation seamlessly achieve DORA compliance. They cover: DORA's core requirements and how they impact your business. How ISO 27001 provides a structured, practical path to compliance. Actionable steps for conducting gap analyses, managing third-party risks, and implementing incident response plans. Best practices for building resilient digital operations that go beyond simple compliance. Gain an in-depth understanding of DORA requirements and how ISO 27001 best practices can help your financial business comply: Watch Now Unlock Robust Compliance in 2025 Whether you’re just starting your compliance journey or looking to mature your security posture, these insightful webinars offer practical advice for implementing and building robust cybersecurity management. They explore ways to implement key standards like ISO 27001 and ISO 42001 for improved information security and ethical AI development and management. Continuously improve your information security management with ISMS.online – be sure to bookmark the ISMS.online webinar library. We regularly add new sessions with actionable tips and industry trends.
Read More
ISO 27001

Winter Reads: Our 6 Favourite ISMS.online Guides of 2024

In 2024, we saw a wave of new and updated information security regulatory and legal requirements. Regulations like the EU Artificial Intelligence (AI) Act, the updated Network and Information Security (NIS 2) Directive, and the upcoming Digital Operational Resilience Act (DORA) present organisations with brand-new compliance challenges. Additionally, AI technology continues to evolve, and new information security threats and opportunities are emerging at pace. In the current landscape, it’s vital for business leaders to stay ahead of the curve. To help you stay up to date on information security regulatory developments and make informed compliance decisions, ISMS.online publishes practical guides on high-profile topics, from regulatory updates to in-depth analyses of the global cybersecurity landscape. This festive season, we’ve put together our top six favourite guides – the definitive must-reads for business owners seeking to secure their organisations and align with regulatory requirements. Getting Started with NIS 2 Organisations that fall under the scope of NIS 2 are now legally required to comply with the directive, which came into effect in October. Our guide covers everything you need to know about the directive designed to strengthen the digital infrastructure across the EU, including NIS 2 core requirements, the business types that must comply, and, of course, how to comply with the regulation. You’ll discover: A detailed list of the NIS 2 enhanced obligations so you can determine the key areas of your business to review Seven core steps to manage your cybersecurity and align with the requirements of the directive Guidance on how to achieve NIS 2 compliance using ISO 27001 certification. Ensure your business complies with the NIS 2 directive and secure your vital systems and data – download the guide. Discover NIS 2 AI Management Made Easy: The No-Stress Guide to ISO 42001 The groundbreaking ISO 42001 standard was released in 2023; it provides a framework for how organisations build, maintain and continuously improve an artificial intelligence management system (AIMS). Many businesses are keen to realise the benefits of ISO 42001 compliance and prove to customers, prospects and regulators that their AI systems are responsibly and ethically managed. Our popular ISO 42001 guide provides a deep dive into the standard, helping readers learn who ISO 42001 applies to, how to build and maintain an AIMS, and how to achieve certification to the standard. You’ll discover: Key insights into the structure of the ISO 42001 standard, including clauses, core controls and sector-specific contextualisation The principles behind the ISO 42001 standard and how they can be applied to your business The ten building blocks for an effective, ISO 42001-compliant AIMS Download our guide to gain vital insights to help you achieve compliance with the ISO 42001 standard and learn how to proactively address AI-specific risks to your business. Get the ISO 42001 Guide The Proven Path to ISO 27001 Ready to set your business up for ISO 27001 success? Our handy “Proven Path to ISO 27001” guide walks you through everything from how to embed ISO 27001 in your organisation and build an information security management system (ISMS), right through to achieving ISO 27001 certification first time! Achieving ISO 27001 certification offers a real competitive advantage for your business, but the process can be daunting. Our simple, accessible guide will help you discover all you need to know to achieve success. The guide walks you through: What ISO 27001 is, and how compliance can support your overall business objectives What an ISMS is, and why your organisation needs one How to build and maintain an ISO 27001-certified ISMS You also learn how the ISMS.online platform provides: An 81% head start on your ISO 27001 policies and controls A step-by-step guided pathway through your implementation - no training required A dedicated team of experts to support you on your way to ISO 27001 success. Read Now The State of Information Security Report 2024 Our ISMS.online State of Information Security Report provided a range of insights into the world of information security this year, with responses from over 1,500 C-professionals across the globe. We looked at global trends, key challenges and how information security professionals strengthened their organisational defences against growing cyber threats. Independently researched by Censuswide and featuring data from professionals in ten key industry verticals and three geographies, this year’s report highlights how robust information security and data privacy practices are not just a nice to have – they’re crucial to business success. The report breaks down everything you need to know, including: The key cyber-attack types impacting organisations globally The top challenges identified by information security professionals and how they’re addressing them Trends across people, budgets, investment and regulations. Download the report to read more and gain the insight you need to stay ahead of the cyber risk landscape and ensure your organisation is set up for success! Read the Report Discover our State of Information Security Australia Snapshot and State of Information Security USA Snapshot for location-specific insights. From Complexity to Clarity: A Comprehensive Guide to Cybersecurity Compliance Navigating the world of cybersecurity regulations can seem like a daunting task, with organisations required to comply with an increasingly complex web of regulations and legal requirements. In the guide, we break down everything you need to know about major compliance regulations and how to strengthen your compliance posture. You’ll discover: An overview of key regulations like GDPR, CCPA, GLBA, HIPAA and more A guide to build an effective compliance programme using the four foundations of governance, risk assessment, training and vendor management Best practices for continuous compliance monitoring, reporting and auditing. Ready to elevate your compliance? Download our guide today. Clarify Your Compliance Everything You Need to Know About the ISO 27001:2022 Update As 2024 draws to a close, businesses certified to the 2013 version of ISO 27001 have just under a year left to migrate to the new 2022 version of the standard. The 2022 iteration features a new structure, 11 new controls and five new attributes. Ready to update your ISMS and get certified against ISO 27001:2022? We’ve broken down the updated standard into a comprehensive guide so you can ensure you’re addressing the latest requirements across your organisation. Discover: The core updates to the standard that will impact your approach to information security. The 11 new controls and how they help you safeguard your data. Seamless transition strategies to adopt the new standard quickly and easily. We’ve also created a helpful blog which includes: A video outlining all the ISO 27001:2022 updates A brief ’Summary of Changes’ guide including a roadmap to achieving compliance A demo opportunity to visualise how using ISMS.online could aid your compliance journey. Read the Blog Implementing information security best practices is crucial for any business. We’re here to help you easily action the necessary ISO 27001:2022 changes, maintain compliance, and stay ahead of potential cyber threats. Download Your Guide Unearth Your Information Security Compliance Advantage Whether you’re new to the world of information security or a seasoned infosec professional, our guides provide insight to help your organisation meet compliance requirements, align with stakeholder needs and support a company-wide culture of security awareness.
Read More
ISO 27001

An Integrated Approach: How ISMS.online Achieved ISO 27001 and ISO 27701 Recertification

In October 2024, we attained recertification to ISO 27001, the information security standard, and ISO 27701, the data privacy standard. With our successful recertification, ISMS.online enters its fifth three-year certification cycle—we've held ISO 27001 for over a decade! We're pleased to share that we achieved both certifications with zero non-conformities and plenty of learning. How did we ensure we effectively managed and continued to improve our data privacy and information security? We used our integrated compliance solution – Single Point of Truth, or SPoT, to build our integrated management system (IMS). Our IMS combines our information security management system (ISMS) and privacy information management system (PIMS) into one seamless solution. In this blog, our team shares their thoughts on the process and experience and explains how we approached our ISO 27001 and ISO 27701 recertification audits. What is ISO 27701? ISO 27701 is a privacy extension to ISO 27001. The standard provides guidelines and requirements for implementing and maintaining a PIMS within an existing ISMS framework. Why Should Organisations Look to Implement ISO 27701? Organisations are responsible for storing and handling more sensitive information than ever before. Such a high - and increasing - volume of data offers a lucrative target for threat actors and presents a key concern for consumers and businesses to ensure it's kept safe. With the growth of global regulations, such as GDPR, CCPA, and HIPAA, organisations have a mounting legal responsibility to protect their customers' data. Globally, we're steadily moving towards a compliance landscape where information security can no longer exist without data privacy. The benefits of adopting ISO 27701 extend beyond helping organisations meet regulatory and compliance requirements. These include demonstrating accountability and transparency to stakeholders, improving customer trust and loyalty, reducing the risk of privacy breaches and associated costs, and unlocking a competitive advantage. Our ISO 27001 and ISO 27701 Recertification Audit Preparation As this ISO 27701 audit was a recertification, we knew that it was likely to be more in-depth and have a larger scope than a yearly surveillance audit. It was scheduled to last 9 days in total. Also, since our previous audit, ISMS.online has moved HQ, gained another office and had several personnel changes. We were prepared to address any non-compliances caused by these changes, should the auditor find any. IMS Review Before our audit, we reviewed our policies and controls to ensure that they still reflected our information security and privacy approach. Considering the big changes to our business in the past 12 months, it was necessary to ensure that we could demonstrate continual monitoring and improvement of our approach. This included ensuring that our internal audit programme was up to date and complete, we could evidence recording the outcomes of our ISMS Management meetings, and that our KPIs were up to date to show that we were measuring our infosec and privacy performance. Risk Management and Gap Analysis Risk management and gap analysis should be part of the continual improvement process when maintaining compliance with both ISO 27001 and ISO 27701. However, day-to-day business pressures may make this difficult. We used our own ISMS.online platform project management tools to schedule regular reviews of the critical elements of the ISMS, such as risk analysis, internal audit programme, KPIs, supplier assessments, and corrective actions. Using Our ISMS.online Platform All information relating to our policies and controls is held in our ISMS.online platform, which is accessible by the whole team. This platform enables collaborative updates to be reviewed and approved and also provides automatic versioning and a historical timeline of any changes. The platform also automatically schedules important review tasks, such as risk assessments and reviews, and allows users to create actions to ensure tasks are completed within the necessary timescales. Customisable frameworks provide a consistent approach to processes such as supplier assessments and recruitment, detailing the important infosec and privacy tasks that need to be performed for these activities. What to Expect During an ISO 27001 and ISO 27701 Audit During the audit, the auditor will want to review some key areas of your IMS, such as: Your organisation's policies, procedures, and processes for managing personal data or information security Evaluate your information security and privacy risks and appropriate controls to determine whether your controls effectively mitigate the identified risks. Assess yourincident management. Is your ability to detect, report, investigate, and respond to incidents sufficient? Examine your third-party management to ensure adequate controls are in place to manage third-party risks. Check your training programmes adequately educate your staff on privacy and information security matters. Review your organisation's performance metrics to confirm they meet your outlined privacy and information security objectives. The External Audit Process Before your audit begins, the external auditor will provide a schedule detailing the scope they want to cover and if they would like to talk to specific departments or personnel or visit particular locations. The first day starts with an opening meeting. Members of the executive team, in our case, the CEO and CPO, are present to satisfy the auditor that they manage, actively support, and are engaged in the information security and privacy programme for the whole organisation. This focuses on a review of ISO 27001 and ISO 27701 management clause policies and controls. For our latest audit, after the opening meeting ended, our IMS Manager liaised directly with the auditor to review the ISMS and PIMS policies and controls as per the schedule. The IMS Manager also facilitated engagement between the auditor and wider ISMS.online teams and personnel to discuss our approach to the various information security and privacy policies and controls and obtain evidence that we follow them in day-to-day operations. On the final day, there is a closing meeting where the auditor formally presents their findings from the audit and provides an opportunity to discuss and clarify any related issues. We were pleased to find that, although our auditor raised some observations, he did not discover any non-compliance. People, Processes and Technology: A Three-Pronged Approach to an IMS Part of the ISMS.online ethos is that effective, sustainable information security and data privacy are achieved through people, processes and technology. A technology-only approach will never be successful. A technology-only approach focuses on meeting the standard's minimum requirements rather than effectively managing data privacy risks in the long term. However, your people and processes, alongside a robust technology setup, will set you ahead of the pack and significantly improve your information security and data privacy effectiveness. As part of our audit preparation, for example, we ensured our people and processes were aligned by using the ISMS.online policy pack feature to distribute all the policies and controls relevant to each department. This feature enables tracking of each individual's reading of the policies and controls, ensures individuals are aware of information security and privacy processes relevant to their role, and ensures records compliance. A less effective tick-box approach will often: Involve a superficial risk assessment, which may overlook significant risks Ignore key stakeholders' privacy concerns. Deliver generic training not tailored to the organisation's specific needs. Execute limited monitoring and review of your controls, which may result in undetected incidents. All of these open organisations up to potentially damaging breaches, financial penalties and reputational damage. Mike Jennings, ISMS.online's IMS Manager advises: "Don't just use the standards as a checklist to gain certification; 'live and breathe' your policies and controls. They will make your organisation more secure and help you sleep a little easier at night!" ISO 27701 Roadmap – Download Now We've created a practical one-page roadmap, broken down into five key focus areas, for approaching and achieving ISO 27701 in your business. Download the PDF today for a simple kickstart on your journey to more effective data privacy. Download Now Unlock Your Compliance Advantage Attaining recertification to ISO 27001 and ISO 27001 was a significant achievement for us at ISMS.online, and we used our own platform to do so quickly, effectively and with zero non-conformities. ISMS.online provides an 81% head start, the Assured Results Method, a catalogue of documentation that can be adopted, adapted, or added to, and our Virtual Coach's always-on support. Easily ensure your organisation is actively securing your information and data privacy, continuously improving its approach to security, and complying with standards like ISO 27001 and ISO 27701. Discover the benefits first-hand - request a call with one of our experts today.
Read More
ISO 27001

Were We Right? Revisiting Our 2024 Cybersecurity Trend Predictions

Ah, 2024—a year that served us a heady cocktail of cyber drama, regulatory breakthroughs, and the occasional ransomware headache. We made some bold cybersecurity predictions in late 2023, armed with a metaphorical crystal ball (and copious amounts of coffee). Now it's time to fess up. Did we nail it? Were we close? Or did we miss the mark entirely? Grab a cup of tea—or maybe something stronger—and let's dive into the good, the bad, and the "wow, we actually predicted that!" moments of 2024. Prediction #1: Increasing Regulation of AI and Machine Learning (ML) What We Said: 2024 would be the year governments and businesses woke up to the need for transparency, accountability, and anti-bias measures in AI systems. The year didn't disappoint when it came to AI regulation. The European Union finalised the groundbreaking AI Act, marking a global first in comprehensive governance for artificial intelligence. This ambitious framework introduced sweeping changes, mandating risk assessments, transparency obligations, and human oversight for high-risk AI systems. Across the Atlantic, the United States demonstrated it wasn't content to sit idly by, with federal bodies such as the FTC proposing regulations to ensure transparency and accountability in AI usage. These initiatives set the tone for a more responsible and ethical approach to machine learning. Meanwhile, ISO 42001 quietly emerged as a game-changer in the compliance landscape. As the world's first international standard for AI management systems, ISO 42001 provided organisations with a structured, practical framework to navigate the complex requirements of AI governance. By integrating risk management, transparency, and ethical considerations, the standard gave businesses a much-needed roadmap to align with both regulatory expectations and public trust. At the same time, tech behemoths like Google and Microsoft doubled down on ethics, establishing AI oversight boards and internal policies that signalled governance was no longer just a legal box to tick—it was a corporate priority. With ISO 42001 enabling practical implementation and global regulations stepping up, accountability and fairness in AI have officially become non-negotiable. Prediction #2: Increasing Complexity of Ransomware What We Said: Ransomware would become more sophisticated, hitting cloud environments and popularising "double extortion" tactics, and Ransomware-as-a-Service (RaaS) becoming mainstream. Sadly, 2024 proved to be another banner year for ransomware, as attacks became more sophisticated and their impacts more devastating. Double extortion tactics surged in popularity, with hackers not just locking down systems but also exfiltrating sensitive data to increase their leverage. The MOVEit breaches epitomised this strategy, as the Clop ransomware group wreaked havoc on hybrid environments, exploiting vulnerabilities in cloud systems to extract and extort. And the business of ransomware evolved, with Ransomware-as-a-Service (RaaS) making it disturbingly easy for less technically skilled criminals to enter the fray. Groups like LockBit turned this into an art form, offering affiliate programs and sharing profits with their growing roster of bad actors. Reports from ENISA confirmed these trends, while high-profile incidents underscored how deeply ransomware has embedded itself into the modern threat landscape. Prediction #3: Expansion of IoT and Associated Risks What We Said: IoT would continue to proliferate, introducing new opportunities but also leaving industries struggling to address the resulting security vulnerabilities. The Internet of Things (IoT) continued to expand at a breakneck pace in 2024, but with growth came vulnerability. Industries like healthcare and manufacturing, heavily reliant on connected devices, became prime targets for cybercriminals. Hospitals, in particular, felt the brunt, with IoT-driven attacks compromising critical patient data and systems. The EU's Cyber Resilience Act and updates to the U.S. Cybersecurity Maturity Model Certification (CMMC) framework sought to address these risks, setting new standards for IoT security in critical infrastructure. Still, progress was uneven. While regulations have improved, many industries are still struggling to implement comprehensive security measures for IoT systems. Unpatched devices remained an Achilles' heel, and high-profile incidents highlighted the pressing need for better segmentation and monitoring. In the healthcare sector alone, breaches exposed millions to risk, providing a sobering reminder of the challenges still ahead. Prediction #4: The Importance of Zero Trust Architectures What We Said: Zero Trust would go from a buzzword to a bona fide compliance requirement, particularly in critical sectors. The rise of Zero-Trust architecture was one of the brightest spots of 2024. What began as a best practice for a few cutting-edge organisations became a fundamental compliance requirement in critical sectors like finance and healthcare. Regulatory frameworks such as NIS 2 and DORA have pushed organisations toward Zero-Trust models, where user identities are continuously verified and system access is strictly controlled. Major players like Google and JPMorgan led the charge, showcasing how Zero-Trust could be scaled to meet the demands of massive, global operations. The shift became undeniable as Gartner reported a sharp increase in Zero-Trust spending. The combination of regulatory pressure and real-world success stories underscores that this approach is no longer optional for businesses intent on securing their systems. Prediction #5: A More Global Approach to Regulations and Compliance Requirements What We Said: Nations would stop working in silos and start harmonising regulations. Our prediction on global regulatory harmony felt almost prophetic in some areas, but let's not pop the champagne just yet. In 2024, international collaboration on data protection did gain traction. The EU-US Data Privacy Framework and the UK-US Data Bridge were notable highlights at the end of 2023, streamlining cross-border data flows and reducing some of the redundancies that have long plagued multinational organisations. These agreements were a step in the right direction, offering glimpses of what a more unified approach could achieve. Despite these frameworks, challenges persist. The European Data Protection Board's review of the EU-U.S. Data Privacy Framework indicates that while progress has been made, further work is needed to ensure comprehensive personal data protection. Additionally, the evolving landscape of data privacy regulations, including state-specific laws in the U.S., adds complexity to compliance efforts for multinational organisations. Beyond these advances lies a growing patchwork of state-specific regulations in the U.S. that further complicate the compliance landscape. From California's CPRA to emerging frameworks in other states, businesses face a regulatory labyrinth rather than a clear path. Meanwhile, divergence between Europe and the UK on privacy and data protection standards continues to widen, creating additional hurdles for organisations operating across these regions. This fragmented approach underscores why global frameworks like ISO 27001, ISO 27701, and the recently introduced ISO 42001 are more critical than ever. ISO 27001 remains the gold standard for information security, providing a common language that transcends borders. ISO 27701 extends this into data privacy, offering organisations a structured way to address evolving privacy obligations. ISO 42001, which focuses on AI management systems, adds another layer to help businesses navigate emerging AI governance requirements. So, whilst steps toward greater alignment have been taken, the global regulatory landscape still falls short of its potential. The continued reliance on these international standards provides a much-needed lifeline, enabling organisations to build cohesive, future-proof compliance strategies. But let's be honest: there's still a lot of room for improvement, and regulators worldwide need to prioritise bridging the gaps to truly ease compliance burdens. Until then, ISO standards will remain essential for managing the complexity and divergence in global regulations. Prediction #6: Greater Regulation of Supply Chain Security What We Said: Supply chain security would dominate boardroom agendas, with SBOMs (Software Bill of Materials) and third-party risk management taking centre stage. Supply chain security remained a top concern in 2024 as software vulnerabilities continued to wreak havoc on organisations worldwide. The U.S. government led the charge with its Cyber Executive Order, mandating the use of Software Bill of Materials (SBOMs) for federal contractors to improve visibility into third-party risks. Meanwhile, NIST and OWASP raised the bar for software security practices, and financial regulators like the FCA issued guidance to tighten controls over vendor relationships. Despite these efforts, attacks on the supply chain persisted, highlighting the ongoing challenges of managing third-party risks in a complex, interconnected ecosystem. As regulators doubled down on their requirements, businesses began adapting to the new normal of stringent oversight. So, Were We Right? 2024 was a year of progress, challenges, and more than a few surprises. Our predictions held up in many areas—AI regulation surged forward, Zero Trust gained prominence, and ransomware grew more insidious. However, the year also underscored how far we still have to go to achieve a unified global cybersecurity and compliance approach. Yes, there were bright spots: the implementation of the EU-US Data Privacy Framework, the emergence of ISO 42001, and the growing adoption of ISO 27001 and 27701 helped organisations navigate the increasingly complex landscape. Yet, the persistence of regulatory fragmentation—particularly in the U.S., where a state-by-state patchwork adds layers of complexity—highlights the ongoing struggle for harmony. Divergences between Europe and the UK illustrate how geopolitical nuances can slow progress toward global alignment. The silver lining? International standards like ISO 27001, ISO 27701, and ISO 42001 are proving indispensable tools, offering businesses a roadmap to build resilience and stay ahead of the evolving regulatory landscape in which we find ourselves. These frameworks provide a foundation for compliance and a pathway to future-proof business operations as new challenges emerge. Looking ahead to 2025, the call to action is clear: regulators must work harder to bridge gaps, harmonise requirements, and reduce unnecessary complexity. For businesses, the task remains to embrace established frameworks and continue adapting to a landscape that shows no signs of slowing down. Still, with the right strategies, tools, and a commitment to continuous improvement, organisations can survive and thrive in the face of these challenges.
Read More
ISO 27001

How to Comply with the New EU Cyber Resilience Act

UK regulation rarely steals a march on the EU. Yet that is precisely what happened in April 2024 when the UK's Product Security and Telecommunications Infrastructure (PSTI) Act, which regulates connected devices, became law. However, what the PSTI managed in speed, it lost in scope. The EU version, the Cyber Resilience Act (CRA), is far broader and more detailed and will set a high bar for compliance­—demanding a rigorous approach to cyber-risk management. At a high level, the CRA is designed to improve the security and reliability of connected technology and make it easier for buyers to discern high-quality products thanks to a kite mark scheme. With penalties of up to €15m or 2.5% of annual turnover, non-compliance is not an option, and for UK firms wishing to tap the vast EU market, it's a must. Fortunately, adherence to best practice security standards like ISO 27001 will do much of the heavy lifting. What Does It Cover? The CRA applies to: Products with digital elements (PDEs) – in other words, software or hardware capable of connecting to a device or network A PDE's "remote data processing" solutions A PDE's software or hardware components which are marketed separately In practice, this means a wide range of products, including smart devices like smartphones, tablets, PCs, TVs and fridges, wearables and even children's toys. Some product categories such as medical devices and vehicles, which are already regulated, are not covered by the CRA as of yet. What Do You Need to Do? The legislation will apply to manufacturers, their authorised representatives, importers, distributors, and retailers. Most of the compliance burden will fall on manufacturers, who must: Assess PDE cybersecurity risks and ensure products are designed and manufactured in compliance with the CRA's essential cybersecurity requirements (ECRs) Ensure components sourced externally don't compromise the PDE's security Document and patch vulnerabilities in a timely manner Provide security support for five years or the product's lifespan (whichever is shorter) Notify EU security agency ENISA within 24 hours of becoming aware of active vulnerability exploitation or another security incident, with information on corrective measures Provide detailed information on how to install product updates, whom to report vulnerabilities to, and other manufacturer details Establish a conformity assessment process to verify CRA compliance Importers will need to be aware of the above in order to fulfil their obligations to ensure only compliant PDEs are sold in the EU. The CRA has an extensive list of ECRs listed in Annex I of the legislation, which are designed to be open-ended rather than detail-focused in order to keep them relevant as technology evolves. They include requirements for PDEs to be: Produced free from known exploitable vulnerabilities and with a secure configuration by default Designed and manufactured with "appropriate" levels of cybersecurity built in and in a way that will reduce the impact of security incidents Capable of protecting against unauthorised access with strong authentication Able to protect the confidentiality of stored, transmitted or processed information, such as via encryption Conformant to data minimisation principles Designed and produced with a limited attack surface Designed to ensure vulnerabilities can be patched via product updates, automatically where possible Produced alongside a vulnerability disclosure policy Time to plan John Moor, head of the IoT Security Foundation (IoTSF), explains that while it's not time to panic just yet, manufacturers will need to start collaborating with their supply chains to determine how new products will comply with the CRA. "Products on the market are out of scope for now but may need an end-of-life plan," he tells ISMS.online. "Although the timeline is approximately 36 months, some provisions will come in sooner. Product manufacturers will need to be compliant on that date, and given that everyone in the supply chain must take ownership, that points to forward planning." In addition to working with these supply chain partners, manufacturers should also assess if internal processes are fit for purpose from a risk and vulnerability management perspective, Moor argues. "Then we get to the product itself. This is where security and privacy-by-design practices come into effect. Many manufacturers will already be familiar with these elements beyond the traditional functionality, performance and power considerations," he says. "Where can they get help? Consultants, test labs and organisations like the IoTSF. We were set up in 2015 and could see the way the world was headed. Hence, we have anticipated what was coming and have embedded advice, process and methodologies in our guides and tools." How ISO 27001 Can Help Given the CRA's lengthy and exacting compliance requirements, organisations may also benefit from following already established best practice standards relevant to the act. Moor says product development standards ISO/SAE 21434 for automotive and IEC/ISA 62443 for Industrial Control Systems are probably the most relevant. However, other experts also say there's some overlap with ISO 27001. Adam Brown, managing security consultant at Black Duck, tells ISMS.online that it could lay a "good foundation" for UK tech firms eyeing the CRA. "ISO 27001's systematic approach to risk management, secure development, supply chain security, incident response, and lifecycle management covers many of the same areas the CRA emphasises. However, ISO 27001 is aimed at organisational security whereas the CRA is aimed at individual products," he adds. "Organisations that have been through ISO accreditation will understand risk assessment; the CRA also mandates a thorough risk assessment per product. Secure by Design and Default: CRA Annexe 1(h) requires that products be designed, developed and produced to limit attack surfaces, including external interfaces. Likewise, ISO 27001's Annex A.14 deals with secure development and support for information systems, including integrating security throughout the software development lifecycle." The good news is that aligning with ISO 27001 won't just set manufacturers up for success with CRA compliance. It can also help create a secure foundation for a raft of other industry regulations and requirements, from NIS 2 to the GDPR. It may be time to take a look.
Read More
ISO 27001

Spooky Statistics: UK Regions Where Businesses are Most Impacted by Cybercrime

Cybercrime presents a growing threat for both businesses and individuals across the globe as threat actors attempt to gain access to sensitive data or finances by almost any means necessary. In the UK, data from Action Fraud shows that businesses reported over 1,600 cybercrimes - not including fraud - between January and September 2024.  In the spirit of Halloween and spooky statistics, we look at the regions with the spine-chillingly highest number of cybercrime reports by organisations in 2024 and how to defend your business against cyber incidents. How Much Did Businesses Lose to Cybercrime in Total? Action Fraud data revealed that organisations reported a total of 1,613 cybercrimes and losses of £932,200 between January and September 2024. Month Cyber Crime Reports Cyber Crime Reported Losses January 2024 196 £423,500 February 2024 200 £89,000 March 2024 191 £2,200 April 2024 179 £24,000 May 2024 173 £120,400 June 2024 206 £5,800 July 2024 182 £63,000 August 2024 149 £190,000 September 2024 137 £14,300 Total 1613 £932,200 January 2024 was the worst month for financial losses at £423,500, making up 45% of the total economic losses throughout the nine months recorded. The highest number of cybercrimes was recorded in June, with 206 reports and £5,800 in reported losses. Meanwhile, the fewest cybercrime reports were made in September, with 137 reports and £14,300 in reported losses. Where Did Businesses Report the Most Cybercrimes? This data is recorded by the police force rather than regionally. Perhaps unsurprisingly, the London Metropolitan Police received the highest number of cybercrime reports from organisations, with 325 reports made between January and September and a total of £69,100 in financial losses. The rest of the top five spots were claimed by Greater Manchester (97 reports), Thames Valley (82 reports), West Yorkshire (54 reports) and West Midlands (47 reports). Rank Police Force Number of Reports Reported Financial Losses 1 Metropolitan 325 £69,100 2 Greater Manchester 97 £891 3 Thames Valley 82 £400 4 West Yorkshire 54 £50,000 5 West Midlands 47 £565 The data demonstrates that a high number of reports doesn’t always lead to higher financial losses. While Greater Manchester ranked second, organisations lost only £891 over the last nine months, and Thames Valley businesses lost £400 to 82 incidents.  Cybercrime: A High-Stakes Game of Chance When ranking regions in order of reported financial losses instead of the number of reports, we again see that the number of cybercrimes doesn’t necessarily increase the amount of economic losses by businesses: Rank Police Force Number of Reports Reported Financial Losses 1 Surrey 31 £442,000 2 Unknown 101 £109,200 3 Hampshire 46 £105,000 4 City of London 35 £98,700 5 Metropolitan 325 £69,100 Organisations in Surrey logged just 31 reports in nine months but a staggering £442,000 in financial losses - nearly half (47%) of the total financial losses to cybercrime reported by businesses in 2024. From the previous list of police forces with the highest number of reports, only London Metropolitan is on this list, ranking fifth with 325 reports and £69,100 in losses. The lack of correlation between the number of reports made to a police force and the financial losses reported demonstrates the indiscriminate nature of cybercrime. Just one cleverly executed attack could see a business lose thousands or even hundreds of thousands of pounds. The mean financial loss per reported cybercrime in Surrey in 2024 stands at £14,258, compared to London Metropolitan’s mean of £213, despite Metropolitan having more than ten times as many reported cybercrimes. Incident Reporting and Regulatory Compliance The Action Fraud statistics only represent reported data. Many cybercrimes are likely not being reported as businesses attempt to manage incidents without police intervention and reduce the impact on their insurance and reputation.  A 2021 study by Van de Weijer et al. showed 529 participants three vignettes about fictional cybercrime incidents and asked how they would react in this situation. The study states that “the large majority of SME-owners said that they would report the incidents from the vignettes to the police, but after actual victimisation, only 14.1 per cent of the cybercrimes were reported to the police.” Reporting cybercrimes is now a requirement for organisations operating in the European Union under the newly updated Network and Information Security (NIS 2) Directive, which came into force this month. Organisations found to be non-compliant, including those that do not report cyber incidents, face potential financial penalties or even exclusion from doing business in a territory. Reporting cyber incidents will also be a requirement under the European Cyber Resilience Act when it enters into force.  Luckily, the internationally recognised information security standard ISO 27001 can provide a framework for NIS 2 compliance and help you defend your business against cyber threats. Using ISO 27001 to Prevent Cyber Incidents and Align with NIS 2 ISO 27001 certification helps businesses improve their security posture and effectively reduce the risk of cyber incidents. To achieve ISO 27001 certification, an organisation must build, maintain and continually improve an ISO 27001-compliant information security management system (ISMS) and successfully complete an external audit undertaken by an accredited auditing body.  An ISO 27001-certified ISMS can improve your organisation’s information security defences and comply with NIS 2 in the following ways: Risk Management Risk management and treatment are requirements of ISO 27001 clause 6.1, actions to address risks and opportunities, and NIS 2 article 21. Your organisation should identify the risks associated with each information asset within the scope of your ISMS and select the appropriate risk treatment for each risk—treat, transfer, tolerate, or terminate.  ISO 27001 Annex A outlines the 93 controls your organisation must consider in the risk management process. In your Statement of Applicability (SoA), you must justify the decision to apply or not apply a control. This thorough approach to risk management and treatment enables your organisation to identify, treat, and mitigate risks throughout their lifecycle, reducing the likelihood of an incident and reducing the impact should an incident occur. Incident Response Your organisation should implement incident management processes and incident logs aligned with ISO 27001 Annex A.5.24, A.5.25, and A.5.26, which focus on information security incident management planning, preparation, decisions, and responses. An incident management procedure and response log are also required by NIS 2 Article 21. This ensures your organisation has a process to manage and minimise the impact of any incidents. Employee Training and Awareness  Fostering a culture of information security awareness is a critical component of ISO 27001 and is equally essential to NIS 2 compliance, which is required by ISO 27001 Annex A.6.3, information security awareness, education, and training, and NIS 2 Article 21. Implementing a training and awareness plan enables you to educate employees about cyber risks. Ensuring employees know the importance of strong passwords in line with your ISO 27001 password policy is also crucial.   Threat actors often exploit human error in their attempts to access sensitive information, even persuading employees to make financial transactions via phishing emails or sophisticated AI-powered deepfakes. Of the 1,613 cybercrimes reported to Action Fraud by UK businesses this year, 919 (56%) were logged under the social media and email hacking code. Having a training and awareness plan in place and educating employees is vital to reduce the risk of these incidents. BOO-st Your Information Security Posture Today With new cyber regulations like the Cyber Resilience Act and the Digital Operational Resilience Act (DORA) on the horizon, now is the time to get ahead. Book your demo to learn how to mitigate risk, bolster your reputation, navigate the complex regulatory landscape, and achieve ISO 27001 compliance using ISMS.online. You can also discover practical guidance for mastering NIS 2 compliance using ISO 27001 in our webinar with experts from A-LIGN, Cybercontrols.io and ISMS.online.
Read More
ISO 27001

How Organisations Can Mitigate Botnet Attacks

An extensive Chinese-backed botnet campaign that weaponised hundreds of thousands of internet-connected devices globally for various malicious actions has emphasised the importance of keeping software up-to-date and replacing products when they reach end-of-life. But as botnets continue to increase in number and sophistication, what else can organisations learn from this incident? What Happened In September, the UK's National Cyber Security Centre (NCSC) and its partners in the United States, Australia, Canada, and New Zealand issued an advisory warning organisations about a China-linked botnet used to launch Distributed Denial of Service (DDoS) attacks, distribute malware, steal sensitive data, and conduct other malicious actions. The botnet compromised more than 260,000 internet-connected devices in the Americas, Europe, Africa, Southeast Asia and Australia. These included routers, firewalls, webcams, CCTV cameras and other devices, many of which were left vulnerable to cybersecurity breaches due to being end-of-life or unpatched. The advisory claims that a Chinese-based company called Integrity Technology Group, which is thought to have connections with the Chinese government, controlled and managed the botnet. Meanwhile, Chinese threat actor Flax Typhoon has been leveraging the botnet in malicious activities. Those behind the malware used Mirai botnet code to hack into these devices and weaponise them for malicious activities. Mirai targets connected devices that run on the Linux operating system and was first spotted by cybersecurity researchers at MalwareMustDie in August 2016. Ken Dunham, director of cyber threat at Qualys Threat Research Unit (TRU), describes Mirai as a "complex botnet system" used for cyber threat campaigns "related to inception, release of source code, and various changes in attacks and targets". He adds: "Mirai continues to be a powerful botnet." Botnets aren't a new phenomenon by any means. They have existed for almost two decades, explains Matt Aldridge, principal solutions consultant at IT security firm OpenText Cybersecurity. But he says instances of nation-states using malicious technologies like botnets are "a more recent development". The Main Causes According to Sean Wright, head of application security at fraud detection specialists Featurespace, this latest botnet campaign infected such a large number of international devices for three main reasons. Wright explains that the first issue is that many of these products had reached the end of their lifecycle, meaning their manufacturers were no longer issuing security updates. But he says there might have been cases where vendors just didn't want to work on patches for security issues. He says the second issue is that the firmware of IoT devices is "inherently insecure and full of security flaws, which makes them easily breachable. Finally, he says devices can become vulnerable to botnet attacks because the end user fails to implement software updates. Wright adds, "They either are not familiar with how to, unaware of the updates and the risk, or simply choose not to. We see the end results of this time and again." Even if a product manufacturer regularly releases software updates and security patches, Aldridge of OpenText Cybersecurity explains that cyber criminals use reverse engineering to exploit security vulnerabilities and take control of connected devices as part of botnet campaigns. Dunham of Qualys Threat Research Unit believes that the "diverse" nature of Mirai is a primary cause of this botnet, explaining that the malicious code uses several years' worth of exploits to "quickly compromise vulnerable devices when timing is best" and to "maximise opportunities to spread" the malware. Key Lessons Given that many of these devices were unpatched, Aldridge of OpenText Cybersecurity says a clear lesson from this latest botnet campaign is that people should always keep their connected devices updated. For Aldridge, another critical lesson is that organisations should properly configure devices before deploying them. He believes this is the key to ensuring the "maximum security" of connected devices. Aldridge explains: "If connections to a device are not enabled, it becomes extremely difficult to compromise, or even to discover that device." Wright of Featurespace recommends that organisations create a device and software inventory. By regularly monitoring product update feeds as part of this, he says organisations won't miss the latest updates. When purchasing devices, Wright advises organisations to ensure the manufacturer provides adequate support and clearly defines the lifespan of its products. And when a device is no longer eligible for support, Wright adds that organisations should replace them as quickly as possible. Echoing similar thoughts to Wright, Dunham of Qualys Threat Research Unit (TRU) says it's clear that organisations must develop and implement a succession plan that enables them to manage all forms of hardware and software risk "over time". "Ensure you have a rock solid CMDB [configuration management database] and inventory in place that you can trust, assets that are classified and known against it, and EOL is identified and managed via a company risk policy and plan," he says. "Remove EOL and unsupported OS hardware and software from production to best reduce risk and attack surface." Other Steps To Take Beyond regularly updating the software of connected devices, are there any other ways organisations can prevent botnets? OpenText Cybersecurity's Aldridge believes so. He believes that organisations should also monitor their devices and systems for signs of irregular traffic and activities. He also recommends segmenting networks and securing them using multiple protective layers, adding that these steps will "reduce the risk and limit the impact of a potential compromise." Wright of Featurespace agrees that organisations need to pay extra attention to their network security in order to mitigate botnets. He says tools like IPS (Intrusion Protection System) or IDS (Intrusion Detection System) will notify users of potential malicious activity and block it. Dunham of Qualys Threat Research Unit (TRU) urges organisations to consider whether they have strong enough cyber defences to tackle botnets, such as zero-trust architecture. Dunham says these should be reinforced with continuous operations improvements by embracing purple learning, whereby organisations boost their cyber defences using both offensive and defensive approaches. The Importance Of Industry Frameworks Adopting an industry-recognised professional framework like ISO 27001 will also help organisations develop a broad and proactive cybersecurity approach to prevent botnets and other cyber threats at any time. Wright of Featurespace explains that industry frameworks provide organisations with a benchmark and set of requirements that they can follow to shore up their cyber defences and lower cyber risk. He adds: "This also helps potential customers have a greater degree of confidence that the appropriate security controls are in place." Aldridge of OpenText Cybersecurity says adhering to an industry framework should help organisations understand the processes and policies they must adopt to procure, deploy, monitor and dispose of devices securely. Botnets can have severe consequences for victims, from data theft to DDoS attacks. And, if you're failing to update your devices regularly or are using end-of-life products, there's every chance a threat actor could be using one of your devices to conduct such nefarious actions. But preventing this from happening isn't just a case of reacting to threats as you hear about them; it requires a long-term commitment to cybersecurity, which can be simplified through industry frameworks.
Read More
ISO 27001

Initial Access Brokers: The Indispensable Link in the Cybercrime Supply Chain

This year is on track to be a record-breaker for ransomware groups. Blockchain analysis reveals that “inflows” to cryptocurrency addresses associated with criminals reached $460m in the first half of 2024, up from $449m in the same period last year. And the median ransom payment for some of the most prolific ransomware groups has surged from just under $200,000 in early 2023 to $1.5m in mid-June 2024. Now, there are many reasons why ransomware groups, and the cybercrime underground in general, continue to flourish. But a big part of their success lies with the initial access broker (IAB): a critical player in the cybercrime supply chain. Finding a way to mitigate their tactics, techniques and procedures (TTPs) will be vital if organisations want to minimise their exposure to financial and reputational risk. Eyes on the Prize At a very simple level, IABs are so important because they focus on one thing and do it exceptionally well. By concentrating on the first stage of an attack only, they insulate themselves from law enforcement—something they also achieve by working privately with ransomware-as-a-service (RaaS) affiliates. On the other side, by outsourcing to the IAB the time-consuming work of selecting targets and gaining access to victim organisations, other cyber-criminals can focus more of their time on scaling their efforts. When not working privately with RaaS groups, IABs list their services on hacking forums, which enables researchers to get a better-informed picture of the market. According to a new Cyberint report, some offer bundled deals, while others sell access individually, and highly trusted individuals may require buyers to contact them directly without providing any information at all. The report highlights three main types of IAB. Those that sell access to: Systems compromised by backdoors and other malware installed on networked computers Servers compromised through brute-forcing Remote Desktop Protocol (RDP) Compromised network devices, such as VPN servers and firewalls, which provide a stepping stone into the corporate network According to Cyberint, RDP access was most common in 2023, accounting for over 60% of IAB listings. However, so far this year, RDP access (41%) has been challenged by VPN compromise (45%). Other access types include: Email: Often via compromised credentials, which allows attackers to read, send and manipulate emails Database: Via stolen credentials or vulnerability exploitation Webshell: These are scripts that allow threat actors to remotely administrate/execute commands on a targeted server Shell/command-line access: Providing a command-line interface to a compromised system, which enables direct execution of commands File shares: Access to shared drives and file servers, often through compromised credentials or lateral movement IABs may also list their sales by privilege type – domain admin, local admin or domain user – with the higher privileged access costing more. Although access to some valuable environments may result in listings priced at more than $10,000, most IAB posts fall between $500-$2000. That’s an indication of the commoditised nature of the market. In fact, although IABs are increasingly focusing on high-revenue corporate victims, the average price for listings has dropped 60% annually to $1,295, according to Cyberint. Will IABs Come After Your Organisation? Over a quarter (27%) of listings analysed by Cyberint in 2024 were for access at organisations of over $1bn in revenue. In fact, the average revenue of victims so far this year is $1.9bn. But that doesn’t mean smaller organisations are off the hook, according to Cyberint security researcher, Adi Bleih. “In the first half of 2024, our data reveals that organisations with revenues under $10m made up 18.5% of all access listings on major underground forums. This translates to nearly one in five targeted organisations being SMBs, highlighting a significant risk to this sector,” he tells ISMS.online. “Looking more broadly at medium-sized businesses with revenues between $10m and $100m, 29.5% of all targeted organisations fall within this range. This means businesses earning under $100m make up 48% of all initial access broker targets.” Elsewhere, US organisations are most likely to be in the crosshairs, accounting for nearly half (48%) of IAB listings studied. That’s followed by France, Brazil, India, and Italy. However, given the UK is a top-two ransomware target, there’s plenty to keep British CISOs awake at night. According to the report, the most targeted sectors are business services, finance, retail, technology, and manufacturing. The latter increased from 14% of listings in 2023 to 23% so far this year. Blocking Initial Access and Beyond Although no organisation is truly safe from IAB attacks, the good news is that the threat actors themselves tend to stick to tried-and-tested hacking techniques. That means best practice security will help network defenders get a long way to neutralising either initial access, or what comes next. Cyberint recommends simple steps like multi-factor authentication (MFA), least privilege access policies, regular patching, security awareness training, restricted RDP usage, intrusion detection (IDS), network segmentation, and dark web monitoring. Fortunately, best practice standards and frameworks are a great way to formalise such practices. As an example, ISO 27001 addresses the following: Access Control: (Annex A.9). Helps to reduce the chance of IABs infiltrating their networks. Incident Management and Response: (Annex A.16) Rapid detection and response to initial access can help to contain breaches before they can be monetised. Security Awareness and Training: (Annex A.7.2.2) This reduces the likelihood of IABs gaining access via human error, such as phishing or weak passwords. Network Security Controls: (Annex A.13) Dividing the network into smaller, isolated segments limits threat actors’ ability to move laterally once inside the network. Monitoring and Logging: Continuous monitoring and logging of network activity detects and alerts to any unauthorised access attempts. Firewall and IDS/IPS Configuration: Proper configuration helps to detect and block suspicious network activities more effectively. Patch Management and Vulnerability Management: (Annex A.12.6.1) Reduces the number of exploitable vulnerabilities IABs may use to gain initial access. Supply Chain Security: (Annex A.15) Helps prevent IABs from gaining unauthorised access through insecure third parties. Cryptography and Data Protection: (Annex A.10) Data encryption will limit the value of what is accessed following an IAB breach. Physical and Environmental Security: (Annex A.11) Reduces the risk of IABs gaining initial access via physical means, such as a compromised employee. ISO 27001 is based on a Plan-Do-Check-Act (PDCA) cycle, which emphasises continuous improvement of the information security management system (ISMS). Regular internal audits, management reviews, and security updates in line with continuously evolving threats will keep corporate defences fit for purpose over time. IAB attacks are inevitable. But successful breaches don’t have to be.
Read More
ISO 27001

Everything You Need To Know (So Far) About The EU AI Act

Artificial intelligence (AI) has evolved from a futuristic concept to a transformative technology integrated across virtually every industry in the last 12 months. From healthcare and finance to retail and manufacturing, AI is already reshaping how businesses operate, make decisions, and serve customers. However, with this rapid growth comes significant challenges around transparency, ethical use, and managing risks, particularly in areas like privacy, information security, and data protection. Enter the EU AI Act, the world's first comprehensive legislative framework specifically designed to regulate AI technologies. Understanding and adhering to this regulation is now more critical than ever for businesses operating within or interacting with the EU market. Failure to comply could result in severe penalties and damage brand reputation and consumer trust. This blog will explain everything you need to know about the EU AI Act and what businesses should be doing to prepare. What is the EU AI Act? The EU AI Act is legislation introduced by the European Union to create a comprehensive framework for regulating artificial intelligence. It aims to set global standards for how AI systems are developed, deployed, and monitored, focusing on managing AI technology's risks to individuals and society. Objectives of the EU AI Act: Risk Management: One of the core objectives of the EU AI Act is to create a regulatory framework that addresses the risks associated with AI systems, which includes safeguarding privacy, preventing discrimination, and avoiding risks to physical or mental well-being. Balancing Innovation and Safety: The Act seeks to strike a balance between encouraging the continued innovation of AI technologies and protecting public safety, ensuring that AI advancements do not come at the cost of transparency, fairness, or ethical standards. Transparency and Accountability: Another key goal is to promote transparency in AI use, requiring companies to disclose essential information about their AI systems when they impact high-risk areas like healthcare, law enforcement, or employment.   By creating a clear and enforceable regulatory structure, the EU AI Act aims to lead the global conversation on AI governance and provide a model for other nations to follow. Key Components of the EU AI Act Risk-based Approach The EU AI Act employs a risk-based approach that classifies AI systems into four categories based on their potential harm: Unacceptable Risk: AI applications that severely threaten people's rights and safety, such as AI-based social scoring by governments or systems that exploit vulnerable populations, are outright banned. High Risk: AI systems used in critical areas like biometric identification, healthcare, and essential infrastructure are subject to strict oversight. Compliance requirements for high-risk systems include data governance, record-keeping, and detailed risk assessments. Limited Risk: These systems face fewer obligations but must adhere to basic transparency requirements, such as notifying users when interacting with an AI system. Minimal or No Risk: AI systems in this category, such as AI-driven chatbots or recommendation engines, are largely exempt from the regulatory framework.   How to Identify If Your AI Solutions Fall Under "High-Risk" or "Limited-Risk" Categories One of the first steps in navigating the EU AI Act is determining where your AI solutions fall within this risk-based framework. Here's a quick top-level guide: High-Risk AI Systems AI systems that fall under the high-risk category are subject to stringent compliance obligations due to their potential to cause significant harm if they malfunction or are misused. High-risk systems include: Biometric identification systems (such as facial recognition) used in public spaces. AI tools used in critical sectors like healthcare, education, and employment, where decisions based on AI may significantly affect people's lives. Critical infrastructure management, including AI systems that control energy grids, water supplies, and transportation systems.   For these high-risk systems, companies must conduct thorough risk assessments, implement human oversight mechanisms, and ensure the AI systems are safe, reliable, and transparent. Limited-Risk AI Systems These systems carry fewer potential risks and thus face lighter obligations. Examples include: AI systems that interact with users but do not make decisions affecting rights or safety (e.g., chatbots or virtual assistants). AI used for automated decision-making in customer service or recommendation engines. Transparency Obligations The Act introduces several transparency obligations, especially for high- and limited-risk AI systems: Businesses must provide clear documentation on how their AI systems function and how they were trained. Users interacting with AI systems must be informed they are engaging with AI, particularly when those systems make decisions that impact people's rights or well-being. Specific disclosures are required for AI systems involved in data processing to ensure users are aware of the potential privacy implications.   These transparency requirements aim to build public trust in AI technologies by making the systems easier to understand and scrutinise. Prohibited AI Practices Specific AI applications are banned under the EU AI Act due to their potential to cause harm to society. These include: AI-based social scoring systems, which profile individuals based on their behaviour, socioeconomic status, or other personal data, particularly when used by governments. Real-time biometric identification systems used in public spaces for mass surveillance, with narrow exceptions for law enforcement under specific, high-necessity conditions. AI systems that manipulate human behaviour in ways that exploit vulnerabilities, such as those that target children or people with disabilities.   These prohibitions reflect the EU's commitment to preventing the misuse of AI in ways that could undermine human rights, dignity, and privacy. How Does the EU AI Act Affect My Business? The EU AI Act has far-reaching implications for businesses that develop or deploy AI systems within the European Union. Companies must understand and meet the regulation's compliance requirements, whether directly operating in the EU or offering AI products and services to EU citizens. General Compliance Requirements for All AI Providers Regardless of the risk category of their systems, all AI providers must adhere to specific baseline requirements to ensure safety, transparency, and accountability. These general obligations include: Transparency Obligations: • Informing Users: AI providers must ensure that individuals are notified when interacting with an AI system. For example, if users are engaging with a chatbot or another system that could potentially manipulate their behaviour, they need to be clearly notified of its AI nature. • Labelling AI-Generated Content: Any content (e.g., text, audio, or images) generated by AI must be labelled to ensure it is easily identifiable as AI-produced Risk Management Systems: • Risk Identification: All AI providers must implement risk management procedures to assess and mitigate risks associated with deploying their AI systems. While this is less stringent than high-risk systems, every provider must have some form of risk mitigation in place. Data Governance: • Data Quality & Integrity: Providers must take steps to ensure the quality and integrity of the data their AI systems rely on. Although high-risk systems have more specific requirements (discussed below), all AI systems must maintain a certain level of accuracy and bias management. Continuous Monitoring and Testing: • Providers must regularly monitor their AI systems to ensure they remain reliable, accurate, and secure throughout their lifecycle. This is especially important for AI systems that evolve through machine learning. Additional Compliance Requirements for High-Risk AI Providers Providers of high-risk AI systems, such as those involved in biometric identification, critical infrastructure, healthcare, law enforcement, and other sensitive sectors listed in Annex III of the Act, are subject to much more stringent regulations, including: Fundamental Rights Impact Assessments (FRIA): • Assessing Impact on Fundamental Rights: Before deployment, high-risk AI systems must assess their potential impact on fundamental rights (e.g., privacy and non-discrimination). If a Data Protection Impact Assessment (DPIA) is required, it should be conducted in conjunction with the FRIA. Conformity Assessments (CA): • Pre-Market Compliance Checks: High-risk AI systems must undergo conformity assessments before being placed on the market. These assessments verify the system meets the EU AI Act's safety and transparency requirements. If the AI system is significantly modified, the CA must be updated. • Third-Party Audits: Certain high-risk AI systems, such as those used in biometric identification, may require external audits and certifications from independent bodies to ensure compliance. Human Oversight: • Ensuring Human Control: High-risk AI systems must have mechanisms for human oversight, allowing operators to intervene or override the AI's decisions if necessary. This safeguard ensures that AI decisions impacting individuals' rights or safety can be reviewed and corrected by humans. Data Quality and Governance: • Higher Standards for Data: High-risk AI systems must meet stricter data governance standards, ensuring the accuracy, reliability, and fairness of the data used. This includes minimising potential biases and ensuring the integrity of training datasets. Documentation and Traceability: • Comprehensive Record-Keeping: High-risk AI providers must keep detailed records of how the AI system was developed, tested, and trained. This documentation must be transparent and accessible to regulators for audits, ensuring the traceability of the AI's decision-making processes. Public Database Registration (for Public Authorities): Public authorities deploying high-risk AI systems must register them in a public EU database, except for certain sensitive cases such as law enforcement or migration, to promote transparency. These additional layers of compliance reflect the increased potential for harm in sensitive sectors and are critical for ensuring that AI systems operate safely, ethically, and accountable. Potential Penalties for Non-Compliance Non-compliance with the EU AI Act could lead to substantial penalties, similar to the fines imposed under the General Data Protection Regulation (GDPR). Penalties for violating the EU AI Act can reach up to: • €30 million or 6% of a company's global annual turnover, whichever is higher, for serious breaches (such as using AI for prohibited practices). • For less severe breaches, fines can be up to €20 million or 4% of the company's global turnover. These penalties are comparable to GDPR fines and highlight the EU's commitment to enforcing its AI regulation with strict accountability. Businesses must ensure they are compliant to avoid the financial and reputational damage that could result from non-compliance. Balancing Regulation and Growth: Will the Act Stifle or Stimulate AI Development? One concern surrounding the EU AI Act is whether the regulation will stifle innovation by imposing too many restrictions. While the requirements are rigorous, the Act aims to strike a balance between regulation and growth: The compliance demands for high-risk AI systems are indeed strict, but this is balanced by offering businesses a clear path to deploying safe, trustworthy AI. The regulatory burden is lighter for low-risk and minimal-risk AI systems, enabling smaller businesses and startups to innovate without excessive constraints. The Act encourages businesses to invest in AI governance early in development, which may help avoid costly regulatory issues later on, ultimately fostering sustainable growth.   Additionally, the EU is investing in AI research and development through initiatives like Horizon Europe, which provides funding for ethical AI projects. This support is intended to stimulate growth while ensuring that new AI technologies meet the highest standards of safety and accountability. What Businesses Need to Do Now to Prepare To ensure compliance with the EU AI Act, businesses should take immediate steps to prepare: • Legal and Ethical Review: Conduct a thorough legal review of AI systems to ensure they align with the Act's ethical standards and legal obligations. This might involve setting up dedicated compliance teams or working with external experts. • Technical Adjustments: Implement technical safeguards, such as human oversight mechanisms, transparency features, and data protection protocols, to meet the Act's requirements. • Training and Awareness: Educate teams across the organisation about the ethical implications of AI and ensure they are familiar with the compliance requirements. Awareness campaigns and training programs can be valuable in embedding compliance into corporate culture. • Regular Audits and Risk Management: Businesses should adopt a proactive approach by conducting regular audits of their AI systems, using risk management tools and frameworks like an Information Security Management System (ISMS) structured around ISO 27001 for information security and ISO 42001 for AI to ensure ongoing compliance. Leveraging ISO 27001 and ISO 42001 to Streamline EU AI Act Compliance By integrating their processes with ISO 27001 and ISO 42001, businesses can meet the current requirements of the EU AI Act and future-proof themselves against emerging AI regulations that are likely to be introduced in other jurisdictions. These standards provide a comprehensive framework that addresses general information security and AI-specific risks, offering an efficient path to compliance for multiple regulatory environments. • Security and Data Privacy: ISO 27001 ensures robust security and data protection practices, while ISO 42001 addresses the ethical and operational challenges specific to AI. Together, they help businesses meet the EU AI Act's stringent requirements around data governance, privacy, and AI transparency. • Risk Management: By implementing both ISO 27001 and ISO 42001, businesses can streamline their risk management efforts, ensuring they can effectively manage both information security risks and the distinct risks AI systems pose. This alignment makes it easier to integrate AI-specific controls and maintain compliance with global AI regulations. • Audit and Compliance: Following both standards simplifies the audit process required under the EU AI Act and other emerging regulations. ISO 27001 offers well-established guidelines for information security audits, while ISO 42001 adds a layer of AI-focused auditing criteria. This dual compliance approach reduces duplication of efforts, lowers costs, and efficiently positions businesses to meet regulatory demands. Unlocking Efficiencies with ISO 27001 and ISO 42001 Adopting both ISO 27001 and ISO 42001 not only ensures compliance with the EU AI Act but also prepares businesses for forthcoming AI regulations in other regions. Many countries are developing AI-specific laws, and companies that have already aligned with these international standards will be better positioned to meet these future requirements as the bulk of the necessary infrastructure, risk management, and auditing procedures will already be in place. By future-proofing their AI governance through these standards, businesses can stay ahead of regulatory changes, reduce compliance complexity, and confidently focus on innovation. Key Deadlines and Milestones for the EU AI Act's Implementation The EU AI Act entered into force on 2 August 2024. However, there are still a few critical deadlines and milestones for its implementation: • Feb 2025: Ban on AI systems with unacceptable risk takes effect • May 2025: From 2 May 2025, the codes of conduct are applied • Aug 2026: From 2 August 2025, governance rules and obligations for General Purpose AI (GPAI) become applicable • Aug 2026: The bulk of the EU AI Act's obligations will start to apply, including essential requirements for high-risk AI systems (such as AI in biometrics, critical infrastructure, employment, and law enforcement)placed on the market or modified after this date • Aug 2027: Additional obligations will apply for high-risk AI systems that are also regulated as safety components in other EU product safety legislation (e.g., medical devices, aviation systems). This gives companies handling these particular AI systems more time to comply. Preparing for the Future of AI Governance The EU AI Act marks a pivotal moment in the regulation of artificial intelligence, with far-reaching implications for businesses across industries. Understanding this legislation and preparing for its compliance requirements will help companies avoid penalties and build trust with consumers and stakeholders by ensuring that AI systems are ethical, transparent, and safe. Final Tips for Businesses to Ensure AI Practices are Ethical, Compliant, and Sustainable: • Adopt a Proactive Approach: Waiting until the EU AI Act is fully implemented could lead to rushed, reactive efforts. Begin aligning your AI systems with the Act's requirements now, particularly by adopting ISO 27001 and ISO 42001 to establish a strong foundation for compliance. • Invest in Compliance Infrastructure: Set up the necessary processes, such as regular risk assessments, transparency tools, and human oversight mechanisms. By incorporating ISO 27001 for information security and ISO 42001 for AI-specific governance, you ensure smooth compliance while also preparing for future regulations. • Focus on Ethical AI Development: Beyond meeting legal requirements, consider the ethical implications of your AI solutions. Implementing responsible AI practices, supported by ISO 42001, will help with compliance and enhance your reputation as a leader in ethical AI innovation. By taking a proactive stance on AI compliance and integrating both ISO 27001 and ISO 42001, businesses can meet regulatory requirements, simplify future compliance efforts, and position themselves for long-term success.
Read More
ISO 27001

Executive Insights: A Strategic Approach to Navigating NIS 2 and DORA Directives

With NIS 2 taking effect on October 17, 2024, and DORA following in January 2025, organisations face a critical period to align operations with these directives. However, meeting these requirements should not be viewed as just a compliance exercise but as an opportunity to strengthen security and operational resilience. As a business leader, your focus should be on using this regulatory pressure to drive efficiency and future-proof your organisation. Seizing The NIS 2 and DORA Opportunity The convergence of these directives offers a chance to consolidate compliance efforts by developing a unified approach. Rather than managing NIS 2 and DORA separately, a strategic approach anchored in an Information Security Management System (ISMS) structured around ISO 27001 helps to address both sets of requirements while building a stronger foundation for handling cyber risks and operational disruptions. This not only ensures compliance but also strengthens your organisation's ability to adapt to evolving threats. Understanding NIS 2 and DORA Both NIS 2 and DORA share the common objective of improving security and risk management, though their enforcement mechanisms differ. A centralised ISMS provides the structure to handle the overlapping elements of these directives—particularly in areas like incident reporting, risk management, and governance—while allowing for tailored responses to each's unique aspects. NIS 2: Enhancing Cybersecurity Across Multiple Sectors NIS 2 extends the reach of its predecessor, NIS 1, by targeting 18 critical sectors. This directive pushes organisations to strengthen their risk management, incident reporting, and governance approach. As a business leader, you must ensure your risk management practices can handle new demands, especially around timely and accurate incident reporting. DORA: Strengthening Operational Resilience in Financial Services DORA is designed to address the specific needs of the financial sector, focusing on operational resilience and the ability to manage ICT-related incidents. Its essential requirements centre around building robust frameworks for protecting, detecting, responding to, and recovering from ICT disruptions. For financial institutions, this means implementing stringent protocols to minimise the impact of operational risks on their services. Critical Differences Between NIS 2 and DORA While NIS 2 is a directive allowing flexibility in national implementation, DORA will enforce consistent rules across all EU member states. This distinction means that while NIS 2 may offer some variation in its implementation from country to country, DORA will apply uniformly across the financial sector. Navigating the Compliance Challenge Managing the overlapping requirements of NIS 2 and DORA can seem daunting, particularly for organisations operating in multiple sectors. The solution lies in consolidating your compliance strategy into a unified approach, using an ISMS to streamline efforts and avoid redundant processes. In doing so, you reduce complexity and ensure all areas of the organisation adhere to a consistent standard. Developing an Integrated Compliance Strategy for NIS 2 and DORA A unified approach to compliance is essential for ensuring that your organisation can meet the requirements of both NIS 2 and DORA without overextending resources. Here's how an ISMS structured around ISO 27001 can serve as the backbone of this strategy: Understanding Your Risk: Use your ISMS to identify, track and mitigate your potential business risks. In doing so, you simultaneously address the needs of both directives. Ongoing evaluations within the system can help you identify areas of overlap and streamline compliance, allowing your organisation to focus on high-priority risks. Unified Incident Reporting: Establish a single incident response plan that addresses the needs of both directives. Align reporting thresholds, timelines, and communication protocols to meet the varying requirements without complicating the process. By centralising incident management within your ISMS, you ensure swift and coordinated responses across the board. Cyber Resilience Testing: Standardising resilience testing within your ISMS, such as penetration testing or red teaming, ensures that you meet the requirements of both directives without unnecessary duplication. An integrated approach like this also supports continuous improvement, ensuring that your controls evolve with emerging threats and compliance requirements. Cross-Framework Governance: An ISMS integrates governance, risk management, and compliance across the organisation. This reduces duplication and enhances visibility by providing a central hub for monitoring, reporting, and continuous improvement. Training and Awareness: Through your ISMS, you can manage and track staff training programs that meet both NIS 2 and DORA requirements. Build on existing programs to extend staff knowledge of both frameworks, ensuring alignment with broader organisational goals. A strong compliance culture promotes proactive risk management across all teams. Leveraging Technology: A robust ISMS platform can simplify compliance by centralising tasks like risk assessments and incident reporting. Automating these processes reduces administrative burdens and ensures that your organisation stays compliant with both NIS 2 and DORA while providing a structured, scalable approach to managing risks. Why NIS 2 and DORA Are Critical Boardroom Issues These directives go beyond operational concerns—they raise accountability to the boardroom level. Under NIS 2, senior management holds direct responsibility for compliance, with the potential for personal liability in cases of non-compliance. This makes cybersecurity and operational resilience boardroom priorities, requiring proactive involvement from leadership. The restrictions on delegating compliance further heighten the need for direct oversight. Leaders must be actively involved in monitoring risk and resilience measures. This shift demands a more hands-on approach to ensure all compliance efforts align with the organisation's strategic goals. Even if your organisation has robust compliance structures in place, the board must remain engaged. An ISMS enables boards to oversee compliance efforts while ensuring that security and risk management strategies align with broader business goals. Turning Compliance Into a Strategic Advantage By embedding NIS 2 and DORA compliance within your organisation's ISMS, you can transform regulatory pressure into a competitive advantage. The system streamlines processes, enhances operational resilience, and improves governance, ultimately creating a more adaptable organisation. For businesses already aligned with ISO 27001, much of the work is already done. The next step is refining your processes to meet the specific demands of these new directives and using them to build a more substantial, more secure business. For others, adopting an ISMS structured around ISO 27001 now will allow for a unified compliance strategy, helping your organisation thrive in a complex regulatory environment. Ultimately, compliance isn't just about meeting requirements—it's about building a secure, resilient, and adaptable organisation that thrives in the face of evolving threats.
Read More
ISO 27001

When Ransomware Strikes at Night, How Can Your Organisation Stay Safe?

Ransomware is the cybersecurity story of the past decade. But over that time, adversary tactics, techniques, and procedures (TTPs) have continued to shift according to the continuously evolving arms race between attackers and network defenders. With historically low numbers of victim companies electing to pay their extortionists, ransomware affiliates are focusing on speed, timing, and camouflage. The question is: with most attacks now coming at weekends and in the early hours of the morning, do network defenders still have the right tools and processes in place to mitigate the threat? Financial services organisations, in particular will need an urgent answer to such questions ahead of compliance with the EU's Digital Operational Resilience Act (DORA). From Strength to Strength By one measure, ransomware continues to thrive. This year is set to be the highest-grossing ever, according to analysis of crypto payments to addresses linked to criminality. According to an August report from blockchain investigator Chainalysis, ransomware "inflows" year-to-date (YTD) stand at $460m, up around 2% from the same time last year ($449m). The firm claims this increase is largely due to "big-game hunting" – the tactic of going after fewer large corporate victims that may be more capable and willing to pay larger ransoms. The theory is borne out in one payment of $75m by an unnamed company, to the Dark Angels ransomware group earlier this year – the largest ever recorded. Overall, the median ransom payment to the most common ransomware strains has also surged—from just under $200,000 in early 2023 to $1.5m in mid-June 2024. Chainalysis claims this suggests "that these strains are prioritising targeting larger businesses and critical infrastructure providers that may be more likely to pay high ransoms due to their deep pockets and systemic importance. " The apparent strength of the ransomware ecosystem is more impressive given the law enforcement wins of earlier this year, which seemed to disrupt two major groups: LockBit and ALPHV/BlackCat. Chainalysis claims these efforts have fragmented the cybercrime underground somewhat, with affiliates moving to "less effective strains" or launching their own. This chimes with a Q2 2024 analysis by ransomware specialist Coveware, which claims to have observed an increase in the number of "lone wolf" groups not affiliated with any major ransomware "brand". Many have taken this decision "due to the increasing threat of exposure, interruption, and profit loss associated with 'toxic' ransomware brands," it says. However, the bottom line is that these threat actors are still active. And with payment rates declining from a high of around 85% of victims in 2019 to roughly a third of that today, they are always looking for ways to make their efforts more effective. Timing Is Everything A new report from Malwarebytes' ThreatDown group reveals exactly how they hope to do so. It claims that, over the past year, more ransomware groups have attacked victims on weekends and in the early hours of the morning. The threat team dealt with most attacks between 1 and 5 a.m. local time. The reason is obvious: the threat actors hope to catch an organisation when its IT team is fast asleep or recharging its batteries at the weekend. Further, the report claims that attacks are getting faster. Back in 2022, a Splunk study tested 10 top ransomware variants and found the median speed for encrypting 100,000 files was just 43 minutes, with LockBit the quickest of all at just four minutes. But what Malwarebytes is seeing is an acceleration of the entire attack chain – from initial access to lateral movement, data exfiltration and finally, encryption. That gives bleary-eyed network defenders even less time to respond and contain a threat before it's too late. The report also claims that more malicious actors use Living Off the Land (LOTL) techniques, which use legitimate tools and processes to stay hidden inside networks while achieving these ends. "Recent customer incidents from top gangs such as LockBit, Akira and Medusa reveal that most of the modern ransomware attack chain is now composed of LOTL techniques," it says. How to Mitigate Ransomware Risk in 2024 Big-game hunting attacks may garner most of the headlines, but the truth is that most ransomware victims are technically SMBs. Coveware claims that the median size in Q2 2024 was just 200 employees. So how can these organisations hope to defend against stealthy attacks at night and on weekends? "The only solution is to ensure that those assets are monitored with the same diligence at 1am as they are at 1pm," Malwarebytes senior threat intelligence researcher Mark Stockley tells ISMS.online. "That can be achieved by staffing an in-house Security Operations Centre (SOC) that operates 24/7. But for most organisations, it's more practical and cost-effective to use a third-party service, like Managed Detection and Response (MDR), or to have a Managed Service Provider (MSP) do it." As the DORA era looms, such measures will be increasingly necessary for financial services organisations and their suppliers. Continuous monitoring, 24/7 incident response readiness, robust business continuity planning, and regular testing will all be required to satisfy regulators that resilience is at an appropriate level. Stockley believes best practice standards and frameworks like ISO 27001 can help to get organisations to this point. "Like any standard or framework, ISO 27001 is a means to an end. Organisations can arrive at the level of information security they need without it, but standards and frameworks can act as useful maps to help them get there and stay there," he adds. "The right choice of framework depends on the organisation's level of security maturity. Ultimately, cyber-criminals don't care what certifications you have; they only care if they get stopped."
Read More

ISO 27001:2022 requirements


ISO 27001:2022 Annex A Controls

Organisational Controls


People Controls


Physical Controls


Technological Controls


About ISO 27001


Streamline your workflow with our new Jira integration! Learn more here.