ISMS Implementation Guide
Submitted by manager on Tue, 07/28/2015 - 06:47

Contributed by Vinod Kumar Puthuseeri and restored from the Infosecwriters archive.
This paper can serve as a guideline for the implementation of ISMS practices using BS7799 / ISO 27001 standards. To give an insight and help those who are implementing this for the first time and for those who will be coordinating with external consultants for ISMS implementations in their organizations.
This document is in PDF format. To view it click here.
Rate this article:
Breaking out of Prison is easier than you think
Understanding Phishing and Protecting the 8th Layer
Role of Machine Learning in change of Identity and Access Management: A proposed design of IAM for University System
Digital Social Engineering Attacks