Assessment Remediation

ISO 27001

ISO27001 is the recognised standard for Information Security and should be the basis of any organisations approach to security, its information systems and data assets.

 

Rivington will provide a qualified and experienced consultant who will work with the organisation to:

 

•Develop an Information Security Management System (ISMS)


•Develop appropriate security standards and policies including a framework for the adoption, update and retirement of policies


•Develop appropriate controls and metrics to assess the organisation’s compliance with the approved ISMS and Policies


•Work with the organisation to ensure appropriate evidence is available to demonstrate compliance to the standard via an internal audit schedule

 

 

Security Maturity

A Maturity Assessment provides management with a simple, business focused understanding of how its own policies and procedures are embedded within the DNA of the organisation.

 

•Usually focused on Security Policy, Processes or Procedures or a combination of


•Uses a defined, repeatable processes to allow comparison against previous or future assessments


•Helps to understand where budgets can be focused to provide increased ROI and appropriate protection


•Can provide a multi-year roadmap to further improve maturity


•Can include comparisons against peers or other industry sectors

 

 

Additionally a Maturity Assessment provides management with a simple, business focused, understanding of how its own policies and procedures are embedded within the DNA of the organisation.

 

·   Usually focused on Security Policy, Processes or Procedures or a combination of

 

·   Uses a defined, repeatable processes to allow comparison against previous or future assessments

 

·   Helps to understand where budgets can be focused to provide increased ROI and appropriate protection

 

·   Can provide a multi-year roadmap to further improve maturity

 

·   Can include comparisons against peers or other industry sectors

Print Print | Sitemap
© Rivington Information Security 2016