Following a regulation such as GDPR alone will mean there will be a range of work that you will need to get done. This is listed below:
1. Information you hold:
2. Risks: Confidentiality, Integrity, Availability (CIA)
- Identification & evaluation of risks based on CIA.
- Ongoing management of risks. Includes demonstration of work being done to them including putting policies and controls in place as well as regular reviews of risks to tolerate, terminate or otherwise address.
3. Policies and Controls Management:
- Individuals rights and privacy policies & controls based on the risks.
- Information security policies & controls based on the risks.
- Aligning of policies and controls to recognised standards, certifications and regulations frameworks (where required to meet powerful stakeholder expectations)
- Regular reviews of policies & controls, and demonstrating these have taken place.
- Evidencing the consideration of recommended policies & controls to follow recognised frameworks and checklists such as those issued by the ICO, ISO and others.
4. Assessments and Requests to ensure privacy & security by design:
5. Incidents and BCP:
6. Staff engagement:
7. Supply Chain:
- Communications & awareness around privacy and information security – planned and as needs arise
- Dynamic & continuous compliance as the organisation changes its policies, controls and practises
- Contracts, contacts and relationship management
- Beyond suppliers into go-to-market partners and others with access to personal data.
8. Whole System Coordination and Assurance:
- Reporting and monitoring of the ISMS performance
- Audits and regular reviews with recommendations & resolutions
- Evidence based working and integrity of the whole system
- Visibility of progress and status at all times
An ISMS delivers a positive return on investment. The goal of our whitepaper is to show you why, what, and how you can get RoI from an ISMS that fits the business needs.