Remove 2013 Remove Information Security Remove InfoSec Remove Technology
article thumbnail

Announcing the public availability of the Cisco Cloud Controls Framework (CCF)

Cisco Security

ISO IEC 27001:2013Information technologySecurity techniques — Information security management systems — Requirements. ISO/IEC 27017:2015 – Information technologySecurity techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services.

Marketing 124
article thumbnail

ISO/IEC 27002 update

Notice Bored

The newly-published third edition of ISO/IEC 27002 is a welcome update to the primary ISO27k controls catalogue (officially, a 'reference set of generic information security controls'). Aside from restructuring and generally updating the controls from the 2013 second edition, the committee (finally!) hopefully.

IoT 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. But what might they offer the front-facing information security officer – someone with a ten-year plan, wondering what to prepare for down the line? Photo by Mario Tama/Getty Images).

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

are subject to laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (the HITECH Act), as well as regulations such as the Clinical Laboratory Improvements Amendments (CLIA). Security, Privacy and Compliance Can Conflict.

article thumbnail

NBlog Aug 23 - ISMS comms plan

Notice Bored

Yesterday I started preparing an ISMS communications plan to satisfy ISO/IEC 27001 :2013 clause 7.4, Oh no, it's more circumspect: the standard says "the organization shall determine the need for internal and external communications relevant to the information security management system". with a little help from the Web.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In a moment you hear from someone who’s been publishing high quality infosec content on YouTube for the last six years and now has over half a million subscribers. How did he get started and what’s next?

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In a moment you hear from someone who’s been publishing high quality infosec content on YouTube for the last six years and now has over half a million subscribers. How did he get started and what’s next?

Media 52