top of page
Search


Free ISMS ConsultantGPT
Available anytime and free of charge instead of cheap, the online ISMS Consultant for quick progress. ⚫️⚫️🔴


Hidden Threat: Hardware Trojans in IT Manufacturing
The PANDA study by BSI reveals the risk of hardware trojans in modern IT systems and how to defend against them.


ChatGPT as ISMS consultant
The best prompt for your own ConsultantGPT.


NIS2: A potential implementation and audit basis
Übersichtstabelle für NIS2-Compliance auf Basis von ISO/IEC 27001, nützlich als erste Prüfgrundlage und Planungshilfe.


‘Regular’ in the TISAX context: A guide for companies and consultants
This article examines the meaning and interpretation of the term ‘regular’ in the TISAX® context.


The role of internal ISMS on-site audits
I will discuss the importance of on-site audits and explain why they are essential to the integrity and effectiveness of the audit process.


Critical Infrastructure: Drone Identification Systems
The recent incident in Brunsbüttel, where drones were repeatedly sighted over one of the largest chemical parks in Schleswig-Holstein…


Update 2024: Which laws are particularly relevant in the context of information security?
An updated overview of laws and some contractual requirements that can/should influence the policies in an ISMS.


(Draft) Information Security Guideline
Global Information Security Policy: Clear guidelines and flexible implementation for maximum security and efficiency.


VDA ISA: Must and Should Requirements
Must requirements are mandatory, while should requirements have to be implemented unless there are good reasons against it.


How you can immediately shed light on the shadow IT of web services
Microsoft Cloud App Security can secure the use of external web services through comprehensive risk assessments and compliance controls.


ISMS Scoping
In this article, I will discuss ISMS scoping in accordance with ISO 27001, TISAX® and KRITIS.


TISAX® vs. ISO 27001: A comparison of the rating of non-conformities
Differences and similarities in the evaluation of major and minor non-conformities in the TISAX® assessment and ISO 27001 audit...


What are the ISMS resource requirements?
Have you been told that an ISMS can be implemented quickly? Click here...


A friendly and transparent disciplinary process
The ISO 27001 standard requires a disciplinary process in Annex A.7.2.3, and many companies experience difficulties...


CISOs cannot save the world
They ensure that others can save the world by having a functioning and adequate information security management system (ISMS).
BLOG
bottom of page