Volg ICTI

Blog ISO 27001

Training implementing ISO 27001 with certificate

If you work in a security team that uses the standard ISO 27001, it is useful to complete a formal ISO 27001 training so that you use the standard correctly. We are now offering a short course that covers the fundamentals of information security based on ISO 27001.

Sieuwert van Otterloo

ISO 27001 technological controls for software development

The latest version of ISO 27001 contains multiple controls about secure development, engineering, coding and testing that seem to overlap. In this article we provide guidance how to implement these controls. The overlapping controls explained are 8.25, 8.26, 8.27 and 8.28. We also cover 8.31 and 8.33 (test environments and test information).

Sieuwert van Otterloo
security-verified-2024-logo

open standard Security Verified updated

Last month (feb 2024), the 2024 version of the open information security standard ‘Security Verified’ was released. This new version contains small changes to make it more readable and easier to combine with the latest version of ISO 27001.

Sieuwert van Otterloo

Register of suppliers – free template

Suppliers come in all shapes and sizes: utilities, cloud platforms, office facilities, email providers, equipment maintenance, accountants, freelancers, PEN-testers and last but not least, information security consultants like ICT Institute. Your relationship with them should include information security considerations. The security requirements for suppliers depends on the service or product they provide. Your outsourced HR…

Sieuwert van Otterloo

Measuring and monitoring your ISO 27001 ISMS

Measuring and monitoring information security is required under clause 9.1 of ISO 27001. In this article we explain how to effectively monitor and measure your ISMS.

Joost Krapels