Logo

    Protecting Your Data: ISO 27036-1: Overview of Risks and Best Practices - Guidance for Supplier Relationships

    en-usAugust 01, 2023
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Howard and Jim chat about  ISO 27036 Part I - Protecting Your Data: Overview of Understanding the Risks and Best Practices Guidance for Supplier Relationships.

    Points discussed include:

    1.  Why is due diligence important when choosing suppliers?
    2.  Why it's important to evaluate the security practices and capabilities of suppliers to make sure that they meet your information security requirements.
    3. What are the key factors to consider when evaluating supplier relationships for information security practices and capabilities?
    4.  Why you need to have processes to manage the information security risks with interacting with your suppliers.
    5.  Why you need to create a culture of information awareness, make sure every day, every single person in your in your organization is thinking information security all day long!

    On Our Next Episodes

    Howard and Jim chat about ISO 27036-2 - Requirements for Information Security in your Supplier Relationships.

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other ISO requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Click here to learn more about the ISO 27001 Gap Checklist.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    #ISO #ISO27001 #ISO27001Certification #InformationSecurityManagementSystems #AnnexA #RiskAssessment #ISOHarmonizedStructure #StatementofApplicability #InternationalStandardsDevelopmen #SimplifyISO #ISO27001:2022 #ISO27008

    Recent Episodes from The ISO Review Podcast

    Guidelines For The Assessment of Information Security Controls - Clause 6.2 Resourcing and Competence

    Guidelines For The Assessment of Information Security Controls - Clause 6.2 Resourcing and Competence

    Howard and Jim chat about ISO/IEC TS 27008:2019 - Guidelines for the assessment of Information Security Controls - Clause 6.2 Reourcing and Competence.

    POINTS DISCUSSED

    1. What are the key takeaways from the discussion on clause 6.2, resourcing and competence?
    2. How does this standard help organizations to assess the effectiveness of their information security controls?
    3. What are the skills and competencies required for information security auditors to conduct effective control assessments?
    4. How do phishing attacks and social engineering tactics put organizations at risk, and what measures can be taken to mitigate these risks?
    5. What were the main points in the discussion about the importance of thorough assessment and the need for adequate time to conduct these assessments?
    6. How do ISO standards like 27001, 27002, 27005, 27007, and 27008 contribute to the overall management of information security in an organization?
    7. What are the potential risks and benefits of engaging subject matter experts in information security auditing?
    8. How can organizations work towards continuous improvement in their information security management system through regular audits and training?

    LEARN MORE

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    UPCOMING EPISODE

    Howard and Jim  Deep Dive into ISO/IEC TS 27008:2019 - Review Methods, Overview and Process Analysis  - Clause 7.1-7.2.

    NEXT STEPS

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles
    YouTube

    Book Recommendations:

    Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet

    The Checklist Manifesto: How to Get Things Right by Atul Gawande

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    Jim Moran, Simplify ISO, ISO, ISO 27008, Information Security Management Systems, Risk Management, ISO Review Podcast, Howard Fox

    #ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ISOReviewPodcast

    Note:  As an Amazon Associate, we earn from qualifying purchases.

    ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.4 - 6.5

    ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.4 - 6.5

    Howard and Jim chat about ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.4 - 6.5.

    POINTS DISCUSSED

    1. How does the process of obtaining permission to access all areas and controls play into the effectiveness of an information security audit?
    2. Why is it crucial for auditors to create a review checklist, and what should typically be included in this checklist?
    3. In what ways do discussions with employees provide valuable insights into the efficacy of the information security management system?
    4. How do auditors provide "reasonable assurance" about the achievement of information security goals?
    5. How can organizations strike a balance between accepting a certain level of risk and ensuring adequate backup and protection to counter threats?
    6. What are some of the latest trends in risk-based approaches to information security that organizations need to stay abreast of?
    7. The importance of objective analysis and professional reporting during the audit, and what makes an auditor skilled in this aspect
    8. What are the main challenges when ensuring that all employees understand and follow the established policies and procedures?
    9. What resources and training should organizations prioritize to equip their teams for effective information security management?

    LEARN MORE

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    UPCOMING EPISODE

    Howard and Jim  Deep Dive into ISO/IEC TS 27008:2019 - Guidelines for the assessment of Information Security Controls - Clause 6.2, Resourcing and Competence.

    NEXT STEPS

    Please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles
    YouTube

    Book Recommendations:

    Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet

    The Checklist Manifesto: How to Get Things Right by Atul Gawande

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    ISO, ISO 27008, Information Security Management Systems, Risk Management, ISO Review Podcast

    #ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ISOReviewPodcast

    Note:  As an Amazon Associate, we earn from qualifying purchases.

    ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.1 - 6.3

    ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.1 - 6.3

    Howard and Jim chat about ISO/IEC TS 27008:2019 - Overview of Information Security Control Assessments - Clauses 6.1 - 6.3.

    POINTS DISCUSSED

    1. What strategies can organizations employ to ensure that their procedures are not only being followed but are also working efficiently and effectively?
    2. How do supply chain contracts affect information security activities, and what role does software play in managing these changes?
    3. What are some of the risks involved with updates and changes in software, and how can planning and risk assessment help minimize those risks?
    4. In the development of checklists for ISO standard compliance, what elements are crucial to include for proper evidence verification and results recording?
    5. Discuss the importance of auditor preparedness, and how can an auditor prepare for assessing information security controls.
    6. How an understanding of business process interconnectivity within the supply chain enhances an auditor's ability to assess information security controls.
    7. Recommended resources for auditors and other professionals to stay informed about technical security standards and best practices.
    8. The role of third-party tests and assessments in the overall audit process, and how should companies approach integrating these findings into their information security framework?

    LEARN MORE

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    UPCOMING EPISODE

    Howard and Jim  Deep Dive into ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls - Clause 6, Part II.

    NEXT STEPS

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles
    YouTube

    Book Recommendations:

    Turn the Ship Around!: A True Story of Turning Followers into Leaders by L. David Marquet

    The Checklist Manifesto: How to Get Things Right by Atul Gawande

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    ISO, ISO 27008, Information Security Management Systems, Risk Management, ISO Review Podcast

    #ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ISOReviewPodcast

    Note:  As an Amazon Associate, we earn from qualifying purchases.

    ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls - Clause 5_Background

    ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls - Clause 5_Background

    Howard and Jim chat about ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls - Clause 5_Background

    POINTS DISCUSSED

    1. What are the key takeaways from the discussion on ISO 27008 and its significance for organizations in terms of information security controls and guidelines?
    2. How do information security controls play a vital role in managing unacceptable risks and promoting effective implementation within organizations, as outlined in the episode?
    3. What were the technical assessment aspects clarified in the episode, especially concerning the assessment of organizational controls, people controls, physical controls, and technological controls?
    4. How does the discussion emphasize the importance of maintaining and improving information security controls and the potential impact of internal and external factors on control effectiveness?
    5. In what ways can ISO 27008 and its application help organizations identify potential problems and shortfalls in control implementations, leading to improved risk mitigation and decision-making processes?
    6. How did the episode shed light on the role of audits and the necessity for objectivity in assessing the compliance and effectiveness of information security controls within the ISO 27008 framework?
    7. What are the potential benefits and implications for organizations in terms of stakeholder confidence, regulatory compliance, and management decisions, resulting from the effective implementation and assessment of information security controls?
    8. How does the episode set the stage for the upcoming discussions on clauses 6, 7, and 8, along with the various annexes?

    LEARN MORE

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    UPCOMING EPISODE

    Howard and Jim  Deep Dive into ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls - Clause 6, Part I.

    NEXT STEPS

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website, and learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    ISO, ISO 27008, Information Security Management Systems, Risk Management, Artificial Intelligence, ISO Review Podcast

    #ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ISOReviewPodcast

    The ISO Review Podcast
    en-usJanuary 30, 2024

    ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls

    ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls

    Howard and Jim chat about ISO/IEC TS 27008:2019 - Guidelines for the Assessment of Information Security Controls.

    Points discussed include:

    1. How do the ISO 27008 and ISO 27001 standards work together to enhance information security within organizations?
    2. Why is it important for organizations to have good monitoring systems in place, and what are some key considerations for setting up effective monitoring?
    3. What are the controls outlined in ISO 27008, and how do they contribute to improving risk management and stakeholder approval?
    4. In what ways can artificial intelligence be utilized to identify risks and enhance the monitoring of information security controls within organizations?
    5. How does the ISO 27008 standard contribute to providing assurance to stakeholders such as customers, partners, and regulatory bodies regarding an organization's robust information security management process?
    6. How can organizations effectively integrate the assessment of controls outlined in ISO 27008 with other ISO standards, such as ISO 27001 and ISO 27002?
    7. What role do people and training play in maintaining the security of information within organizations?
    8. What are some best practices for conducting internal audits to assess the effectiveness of Annex A controls, risk management, and improvement opportunities within an organization's information security management system?

    Complimentary ISO Resources

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    Upcoming Episode

    Howard and Jim  Deep Dive into Information Security Controls, ISO/IEC TS 27008:2019.

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    ISO, ISO 27001, ISO 27008, Information Security Management Systems, Risk Management, Artificial Intelligence, AI, Podcast Interview

    #ISO27001 #ISO27008 #InformationSecurityManagementSystems #RiskManagement #ArtificialIntelligence #AI #PodcastInterview

    Additional Observations and Benefits of Integrating an ISO 27001 Into an Existing ISO 9001 Quality Management System

    Additional Observations and Benefits of Integrating an ISO 27001 Into an Existing ISO 9001 Quality Management System

    Howard and Jim chat about "Additional Observations and Benefits of Integrating an ISO 27001 Into an Existing ISO 9001 Quality Management System."

    Points discussed include:

    1.  How can integrating ISO 27001 into an existing ISO 9001 system benefit an organization?
    2. What are the key differences between ISO 9001 and ISO 27001 in terms of structure and requirements?
    3. How can organizations effectively identify and assess information security risks according to ISO 27001?
    4. What role does leadership play in implementing and maintaining an effective information security management system?
    5. How can organizations ensure that all employees are fully aware of their impact on information security within the organization?
    6. What are some potential weaknesses in communication with suppliers that may pose a risk to information security?
    7. How can organizations utilize visual representations, such as flowcharts, to enhance their management systems?
    8. What are some best practices for conducting internal audits that address the requirements of ISO 27001?
    9. How does ISO 27001 emphasize the need for continual improvement in information security management?
    10. What additional controls and requirements does ISO 27001's Annex A introduce, and how can organizations effectively implement them?

    Complimentary ISO Resources

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    Upcoming Episode

    Howard and Jim chat about the Guidelines for the Assessment of Information Security Controls, ISO IEC TS 27008:2019.

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Connect with Howard on LinkedIn.

    Keywords

    #ISO #ISO27001 #ISO27001Certification #ISO27001Integration #InformationSecurityManagementSystems

    The ISO Review Podcast
    en-usNovember 21, 2023

    Information Security in Supplier Contracts: ISO 27036 Part 2, Clause 7.5 - Supplier Termination Process

    Information Security in Supplier Contracts: ISO 27036 Part 2, Clause 7.5 - Supplier Termination Process

    Howard and Jim chat about  ISO 27036-2, Clause 7.5 - Supplier Termination Process.

    Points discussed include:

    1.  How important is it for organizations of all sizes to prioritize information security?
    2.  What are some challenges organizations face when it comes to supplier relationship termination?
    3.  How can ISO standards help organizations in managing their supplier relationships and information security?
    4.  What are some potential risks or consequences of not properly terminating a supplier relationship?
    5.  How can organizations ensure a smooth and secure transition when terminating a supplier relationship?
    6.  What role does communication play in the supplier termination process, particularly in terms of information security?
    7.  What are some best practices for creating a termination plan within a supplier agreement?
    8.  How can organizations protect their information and intellectual property during and after a supplier relationship termination?
    9.  What steps should organizations take to ensure legal and regulatory compliance during the supplier termination process?
    10.  How can organizations evaluate the effectiveness of their supplier termination process in terms of information security?

    Complimentary ISO Resources

    Click here to try Conformance1's free online ISO 27001 Gap Checklist.

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Connect with Howard on LinkedIn.

    Keywords

    #ISO #ISO27001 #ISO27001Certification #InformationSecurityManagementSystems  #SupplierRelationshipTerminationProcess

    Information Security in Supplier Contracts: ISO 27036 Part 2, Clause 7.4 - Supplier Relationship Management Process

    Information Security in Supplier Contracts: ISO 27036 Part 2, Clause 7.4 - Supplier Relationship Management Process

    Howard and Jim chat about  ISO 27036-2, Clause 7.4 - Supplier Relationship Management Process.

    Points discussed include:

    1.  The importance for organizations to have a process for managing supplier relationships in terms of information security.
    2.  The potential risks or vulnerabilities that organizations may face when it comes to information security in the supply chain.
    3.  What organizations can do to ensure that their suppliers are meeting the information security requirements stated in the contract.
    4.  The role communication plays in ensuring successful supplier relationship management in terms of information security.
    5.  The ways organizations can effectively monitor and enforce compliance with information security requirements in the supplier relationship.
    6.  Key considerations for organizations when transitioning from one supplier to another in terms of information security.
    7.  What organizations can do to mitigate the risks associated with information security during the transition to a new supplier.
    8.   The steps organizations can take to train their employees on information security requirements in the supplier relationship.
    9.  The potential challenges or obstacles that organizations may face when managing supplier relationships in terms of information security.
    10.  What steps can organizations prepare for and respond to situations where information security issues arise in the supplier relationship?

    Complimentary ISO Resources

    Click here to try Conformance 1's free online ISO 27001 Gap Checklist.

    Upcoming Episodes

    Howard and Jim chat about: 

    • ISO 27036-2 Supplier Relationship Requirements - Clause 7.5 - Supplier Relationship Termination Process

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    #ISO #ISO27001 #ISO27001Certification #InformationSecurityManagementSystems  #SupplierRelationshipAgreement

    Information Security in Supplier Contracts: ISO 27036 Part 2, Clause 7.3 - Supplier Relationship Agreement

    Information Security in Supplier Contracts: ISO 27036 Part 2, Clause 7.3  - Supplier Relationship Agreement

    Howard and Jim chat about  ISO 27036-2, Clause 7.3 - Supplier Relationship Agreement Process.

    Points discussed include:

    1.  How important it is for businesses to have supplier contracts that address information security?
    2.  The key elements that should be included in an agreement to ensure information security.
    3.  How can businesses effectively measure their suppliers' compliance with information security requirements?
    4.  What role does change management play in supplier agreements and information security?
    5.  How can businesses ensure a smooth transition with their suppliers when it comes to information security?
    6.  The potential risks and challenges businesses face when it comes to maintaining information security in the supply chain.
    7.  How businesses can effectively monitor and enforce their suppliers' compliance with information security standards.
    8.  The criteria  businesses should use when selecting suppliers for information security purposes.
    9. The measures businesses can take to protect sensitive information during and after the termination of a supplier agreement.
    10.  Industry-specific considerations or regulations that businesses should be aware of when it comes to information security in the supply chain

    Complimentary ISO Resources

    Click here to try Conformance 1's free online ISO 27001 Gap Checklist.

    Upcoming Episodes

    Howard and Jim chat about: 

    • ISO 27036-2 Supplier Relationship Requirements - Clause 7.4 - Supplier Relationship Management Process
    • ISO 27036-2 Supplier Relationship Requirements - Clause 7.5 - Supplier Relationship Termination Process

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    #ISO #ISO27001 #ISO27001Certification #InformationSecurityManagementSystems  #SupplierRelationshipAgreement

    Cybersecurity in Supplier Relationships: ISO 27036 Part 2, Clause 7.2 - Supplier Selection Process

    Cybersecurity in Supplier Relationships: ISO 27036 Part 2, Clause 7.2 - Supplier Selection Process

    Howard and Jim chat about  ISO 27036-2, Clause 7.2 - Supplier Selection Process.

    Points discussed include:

    1.  How can organizations effectively plan their supplier relationships to mitigate information security risks?
    2.  What are some real-life examples of information security breaches and their impact on organizations? 
    3.  Why is it important for organizations to communicate the importance of information security to all employees, and how can top management lead by example?
    4.  What are some key elements that should be included in a supplier relationship plan to ensure information security?
    5.  How can organizations assess and manage risks in their relationships with suppliers?
    6.  Why is it impossible to eliminate all information security risks, and how can organizations determine acceptable levels of risk?
    7.  What role does legal and regulatory compliance play in supplier relationship planning for information security?
    8.  How can organizations ensure that their suppliers are complying with information security requirements and addressing potential risks? 
    9.  What are some considerations for evaluating new suppliers in terms of their information security impact?
    10.  Why is it important to continually maintain and update information security measures in an organization?

    Complimentary ISO Resources

    Click here to try the online ISO 27001 Gap Checklist.

    Upcoming Episodes

    Howard and Jim chat about: 

    • ISO 27036-2 Supplier Relationship Requirements - Clause 7.3 - Supplier Relationship Agreement
    • ISO 27036-2 Supplier Relationship Requirements - Clause 7.4 - Supplier Relationship Management Process
    • ISO 27036-2 Supplier Relationship Requirements - Clause 7.5 - Supplier Relationship Termination Process

    Next Steps

    If you enjoyed this episode, please follow us on your preferred podcast directory. We appreciate your likes & comments, and invite you to share episode with anyone who might benefit from learning about this topic.   

    Click here to visit the SimplifyISO website to discover how our cloud-based management system will satisfy all the Standards requirements, client requirements, and any other requirements that you have to meet.

    Click here to visit the International Management System Institute website so that you can learn about how and why you should consider becoming a Certified ISO Management System Professional.

    Learn more about Jim on LinkedIn & YouTube

    LinkedIn
    LinkedIn Articles:
    YouTube

    Learn more about Howard

    Click here to learn more about the Coaching and Podcast Services provided by Fox Coaching, inc.

    Keywords

    #ISO #ISO27001 #ISO27001Certification #InformationSecurityManagementSystems  #I

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io