
Step by Step to Your Information Security Management System (ISMS)
How can you easily set up an information security management system (ISMS)?
Topic
Legislation, standards, regulationsGovernance, Riskmanagement and Compliance
When & Where
Details
Format:
Management lecture
Session description
With the adoption of the NIS-2 guideline, the importance of an ISMS for companies has further increased. The NIS-2 Directive aims to strengthen cybersecurity in the EU and increase resilience to cyber threats.
The basis is an ISMS that promotes continuous monitoring, review, and improvement of cybersecurity measures. This helps organizations adapt to new threats and technological developments and continually optimize their security practices.
The implementation of an ISMS in a company takes place step by step.
The first step is to select the appropriate guideline or standard that describes all relevant measures of an ISMS, such as ISO 27001, BSI IT-Grundschutz, VDA ISA, CISIS12, or VdS1000. An ISMS according to these standards is therefore the cornersto ...
The basis is an ISMS that promotes continuous monitoring, review, and improvement of cybersecurity measures. This helps organizations adapt to new threats and technological developments and continually optimize their security practices.
The implementation of an ISMS in a company takes place step by step.
The first step is to select the appropriate guideline or standard that describes all relevant measures of an ISMS, such as ISO 27001, BSI IT-Grundschutz, VDA ISA, CISIS12, or VdS1000. An ISMS according to these standards is therefore the cornersto ...
Moderator
