Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...
™

39% of UK CEOs admit that cyber attacks are unavoidable

A new study from KPMG has found that 39% of UK CEOs believe a cyber attack on their organisation is inevitable. This figure is likely a reaction to the upsurge in cyber ...
™

Save time and money this summer with Vigilant Software

We have a special offer on our software tool vsRisk™ until the end of September. Purchase the ISO 27001 ISMS Documentation Toolkit, vsRisk risk assessment software tool and one year’s support to ...
How to create an information security policy for ISO 27001

How to create an information security policy for ISO 27001

What is an information security policy for ISO 27001? Your company’s information security policy is the driving force for the requirements of your information security management system (ISMS). The policy needs to ...

Identifying interested parties and their expectations for an ISO 27001 ISMS

There are many reasons for implementing an information security management system (ISMS), and identifying and understanding interested parties is crucial for an organisation to develop its information security. What is an ISMS? ...
™

How to create a risk treatment plan for your information security management system

A risk treatment plan (RTP) is one of the mandatory reports that you will need to produce for your ISO 27001 information security management system (ISMS). What is a risk treatment plan? ...