Leveraging ISO 27001 to Manage Cyber & Information Security Risks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

A systematic approach to protecting key information assets is a powerful weapon in combating information risks by helping determine the types of security controls needed. This is where standards of cyber and information security come in, and ISO 27001 has been one of the most popular for many years.

In this webinar, we will look at how the ISO 27001 standard has come to be recognized as the international benchmark for information and cybersecurity practitioners, how to achieve it, and most importantly, what it takes to remain compliant.

Key takeaways:

  • What you need to consider to achieve ISO 27001 certification
  • How to maintain compliance with ISO 27001 and other standards such as ISO 27701 and ISO 27018
  • Top considerations and key lessons learned from information assurance

Speakers

Photo of Gopalakrishnan Kary

Gopalakrishnan Kary

Global Service Management Systems Manager, Motorola Solutions.

Photo of Chris Oakley

Chris Oakley

VP Technical Services, Americas, Nettitude

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for LRQA here: https://www.lrqa.com/en-gb/privacy-notice/. Please see Infosecurity Magazine’s privacy policy for more information.