Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
IT Security Talks Stream I

Compliance requirements with CISIS12

CISIS12 stands for Compliance and Informationsecurity in twelve steps.

calendar_today Wed, 03.05.2023, 15:00 - 15:30

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Governance, Riskmanagement and Compliance Managed Security Services / Hosting

Event

This action is part of the event IT Security Talks

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


CISIS12 is an Information Security Management System (ISMS), which is developed, published, trained and distributed by the IT-Security and safety Cluster. It is the result of a ten year development period. CISIS12 is based on the experiences accumulated from the previous versions. The managementsystem is structured simple and comprehensible, even for newcomers it is easily understandable and logical to use. Results can be generated very quickly, which are well suited for a stable and robust management system to be brought to life in a relatively short time.

CISIS12 stands for Compliance and Informationsecurity in twelve steps. The framework enables organisations to roll out information security processes both horizontally and vertically. It is designed to be scalable and helps to set up and maintain an understandable, accepted and appropriate security structure in KMO.

... read more

Language: German

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.