{"id":203,"date":"2009-02-18T00:00:00","date_gmt":"2009-02-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/18\/clear-guide-on-how-to-benefit-from-iso27001-in-a-windows-environment-now-available\/"},"modified":"2021-12-30T11:36:44","modified_gmt":"2021-12-30T11:36:44","slug":"clear-guide-on-how-to-benefit-from-iso27001-in-a-windows-environment-now-available","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/18\/clear-guide-on-how-to-benefit-from-iso27001-in-a-windows-environment-now-available\/","title":{"rendered":"Clear Guide on How to Benefit from ISO27001 in a Windows\u00ae Environment Now Available"},"content":{"rendered":"<p>Independent compliance expert IT Governance has today announced the publication of Implementing ISO27001 in a Windows\u00ae Environment&#8217; (http:\/\/www.itgovernance.co.uk\/products\/2207), a step-by-step guide on implementing this major security standard, written with the aim of helping project managers, IT and security staff develop a shared understanding of what controls are appropriate to mitigate identified risks &#8211; and how, within the Windows\u00ae environment, to apply them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security management standard (ISMS) ISO\/IEC 27001 encourages organisations to bring technical decision making about information security controls into a business-driven risk-based framework.  This challenges all parties involved in information security management to communicate effectively, especially between technical and non-technical staff about effective security control implementation.<\/p>\n<p>The guide&#8217;s author, Brian Honan, is widely recognised as an industry expert on information security and, in particular, on the ISO27001 information security standard.<\/p>\n<p>A member of the Information Systems Security Association, the Irish Information Security Forum, and the Information Systems Audit and Control Association, Brian established Ireland&#8217;s first ever national Computer Security Incident Response Team.<\/p>\n<p>&#8220;Written in non-technical language and in a style that makes its content accessible to non-technical ISO27001 project managers, Brian&#8217;s invaluable study will give IT security practitioners the information and knowledge they need,&#8221; says Alan Calder, Chief Executive of the book&#8217;s publishers, IT Governance.<\/p>\n<p>IT Governance is &#8216;non-geek&#8217;, approaching IT issues from a non-technology background and talking to management in its own language.<\/p>\n<p>http:\/\/www.emediawire.com\/releases\/2009\/2\/emw2084414.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-203","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=203"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/203\/revisions"}],"predecessor-version":[{"id":2690,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/203\/revisions\/2690"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}