Reader small image

You're reading from  Mastering Information Security Compliance Management

Product typeBook
Published inAug 2023
PublisherPackt
ISBN-139781803231174
Edition1st Edition
Right arrow
Authors (2):
Adarsh Nair
Adarsh Nair
author image
Adarsh Nair

Adarsh Nair is the global head of information security at UST. He is a recognized information security strategist, author, and keynote speaker. Adarsh holds the title of Fellow of Information Privacy (FIP) by IAPP and is a Google Hall of Fame honoree. He serves as co-chair of OWASP Kerala Chapter, an IAPP exam development board member, and an EC-Council advisory board member. With a decade of experience, Adarsh specializes in information security governance, risk and compliance, business continuity, data privacy, ethical hacking, and threat identification and mitigation. He maintains expertise through memberships, training, and certifications, including CISSP, CIPM, CIPP/E, LPT, OSCP, and ISO Lead Auditor. Adarsh has authored two books, published numerous articles and research papers, and delivered impactful presentations at national and international conferences, establishing himself as a thought leader in information security.
Read more about Adarsh Nair

Greeshma M. R.
Greeshma M. R.
author image
Greeshma M. R.

Greeshma M. R. is an entrepreneur and seasoned freelance technology writer, specializing in technology domains, especially information security and Web 3.0. She is interested in exploring the intersection of technology and humanity, as well as the social aspects of technology. Her areas of interest also encompass innovation, sustainable development, gender, and society. She is a co-author and publisher of two books and holds a certification as an ISO 27001 Lead Auditor. Having worked in the IT and knowledge and innovation management domains, Greeshma possesses an interdisciplinary perspective that enriches her approach. She has actively contributed to establishing an innovation ecosystem among students via communities of practice, fostering a culture of creativity and collaboration.
Read more about Greeshma M. R.

View More author details
Right arrow

What this book covers

In Mastering Information Security Compliance Management: A comprehensive handbook on ISO/IEC 27001:2022 compliance, each chapter contributes to building a holistic understanding of the ISO/IEC 27001/27002 standards and their implementation.

Chapter 1, Foundations, Standards, and Principles of Information Security, establishes the groundwork, explaining the core principles of information security and the role of ISO/IEC 27000 standards, specifically ISO/IEC 27001, to develop a robust ISMS.

Chapter 2, Introduction to ISO 27001, provides an in-depth exploration of ISO 27001, its operational model, the benefits, and the processes involved in achieving accreditation from recognized bodies.

Chapter 3, ISMS Controls, focuses on the controls outlined in ISO 27001/27002, detailing their interpretation and application based on the specific business context.

Chapter 4, Risk Management, dives into the integral components of the ISO 27001 framework, emphasizing the role of risk assessment, management, and the necessity of a risk register.

Chapter 5, ISMS – Phases of Implementation, takes you through the various stages involved in developing an ISMS, illustrating how to tailor control implementation to the specific context of a business.

Chapter 6, Information Security Incident Management, covers the essential aspects of incident management, highlighting the importance of comprehensive incident management plans.

Chapter 7, Case Studies – Certification, SoA, and Incident Management, offers practical insights through real-world case studies, focusing on certification, the Statement of Applicability (SoA), and incident management.

Chapter 8, Audit Principles, Concepts, and Planning, delves into the principles of auditing, introducing different types of audits and outlining the processes involved in planning for audits.

Chapter 9, Performing an Audit, guides you through the audit process, from data collection and system effectiveness assessment to the formulation of reports and recommendations.

Chapter 10, Audit Reporting, Follow-Up, and Strategies for Continual Improvement, discusses the importance of audit reporting, follow-up processes, and strategies for the continual improvement of an ISMS.

Chapter 11, Auditor Competence and Evaluation, focuses on the competencies, responsibilities, and ethical conduct required of auditors in the auditing process.

Chapter 12, Case Studies – Audit Planning, Reporting Nonconformities, and Audit Reporting, concludes the book with practical examples and real-world scenarios, focusing on audit planning, reporting nonconformities, and audit reporting.

The entire book offers a comprehensive understanding of the ISO/IEC 27001/27002 standards, presenting both theoretical knowledge and practical application, aiding you in implementing, auditing, and enhancing an ISMS in your organization.

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mastering Information Security Compliance Management
Published in: Aug 2023Publisher: PacktISBN-13: 9781803231174

Authors (2)

author image
Adarsh Nair

Adarsh Nair is the global head of information security at UST. He is a recognized information security strategist, author, and keynote speaker. Adarsh holds the title of Fellow of Information Privacy (FIP) by IAPP and is a Google Hall of Fame honoree. He serves as co-chair of OWASP Kerala Chapter, an IAPP exam development board member, and an EC-Council advisory board member. With a decade of experience, Adarsh specializes in information security governance, risk and compliance, business continuity, data privacy, ethical hacking, and threat identification and mitigation. He maintains expertise through memberships, training, and certifications, including CISSP, CIPM, CIPP/E, LPT, OSCP, and ISO Lead Auditor. Adarsh has authored two books, published numerous articles and research papers, and delivered impactful presentations at national and international conferences, establishing himself as a thought leader in information security.
Read more about Adarsh Nair

author image
Greeshma M. R.

Greeshma M. R. is an entrepreneur and seasoned freelance technology writer, specializing in technology domains, especially information security and Web 3.0. She is interested in exploring the intersection of technology and humanity, as well as the social aspects of technology. Her areas of interest also encompass innovation, sustainable development, gender, and society. She is a co-author and publisher of two books and holds a certification as an ISO 27001 Lead Auditor. Having worked in the IT and knowledge and innovation management domains, Greeshma possesses an interdisciplinary perspective that enriches her approach. She has actively contributed to establishing an innovation ecosystem among students via communities of practice, fostering a culture of creativity and collaboration.
Read more about Greeshma M. R.