Protect your organisation's information assets using ISO27001:2013 Information is one of your organisation's most important resources. Keeping that information secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it. Furthering the objectives of your organisation Information security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. For this reason, ISO27001 is not a one-size-fits-all solution, nor is it designed to be a static, fixed entity. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS. Creating an ISMS based on ISO27001/ISO27002 will help you to: •improve efficiency by having systems and procedures in place, enabling you to focus more on your core business; •protect your information assets from a wide range of cyber threats such as criminal activity and fraud, user errors, outside attack, insider compromise and system failure; •manage risk systematically and put in place a plan to eliminate or reduce cyber threats to your organisation; •prepare for the worst, as ISO27001 requires you to monitor information security events, enabling earlier detection of threats or processing errors, and faster resolution. Completely up to date with the latest 2013 release of ISO27001, ISO27001/ISO27002: A Pocket Guide covers: •The ISO/IEC 27000:2013 family of information security standards •Background to the standards certification process •The ISMS and ISO27001:2013 •Specification vs. Code of Practice •Documentation and Records •Management Responsibility •Policy and Scope •Risk Assessment •Implementation •Continual Improvement