Systemise
Safeguarding Your Systems: Intrusion Detection and Prevention Systems (IDS/IPS)
Risk Assessment in Information Security: Identifying and Mitigating Threats.
Ethical and Social Issues in Information Systems: A Guide for Responsible Technology Use
Security Assessment Report Template
Navigating the Data Landscape: Understanding Privacy Information Management Systems (PIMS).
Information Systems: The Backbone of Modern Organizations.
Making Informed Choices: A Guide to Information Systems for Decision Making (ISDM).
Navigating Your Business Landscape: A Guide to Executive Information Systems (EIS)
Fundamentals of Information Security: Building a Strong Foundation
The Ultimate Guide to Systemizing Your Business: Efficiency, Growth, and Freedom.
Implementing Effective Access Control in Information Security.
A Comprehensive Cybersecurity Audit Checklist
Building Your Knowledge Base: A Guide to Implementing a Knowledge Management System (KMS)
Information System Planning: A Step - by - Step Guide
Annex A.12.4.1 Event logging. - Checklist of# ISO/IEC 27001
Annex A.18.2.3 Technical compliance review - Checklist of# ISO/IEC 27001
Annex A.18.2.2 Compliance with security policies and standards. - Checklist of #ISO/IEC 27001
Annex A.18.2.1 Independent review of information security - Checklist of #ISO/IEC 27001
Annex A.18.1.5 Regulation of cryptographic controls - Checklist of# ISO/IEC 27001
Annex A.18.1.4 Privacy and protection of personally identifiable information - of #ISO/IEC 27001
Annex A.18.1.3 Protection of records - Checklist of# ISO/IEC 27001
Annex A.18.1.2 Intellectual property rights - Checklist of# ISO/IEC 27001
Annex A.18.1.1 Identification of applicable legislation and contractual requirements.#ISO/IEC 27001
Annex A.17.2.1 Availability of information processing facilities - Checklist of #ISO/IEC 27001
Annex A.17.1.3 Verify, review and evaluate information security continuity - Checklist of# ISO 27001
Annex A.17.1.2 Implementing information security continuity - Checklist of #ISO/IEC 27001
Annex A.17.1.1 Business continuity planning - Checklist of #ISO/IEC 27001
Annex A.16.1.7 Collection of evidence - Checklist of# ISO/IEC 27001
Annex A.9.2.6 Removal or adjustment of access rights - Checklist of# ISO/IEC 27001
Annex A.9.2.5 Review of user access rights - Checklist of #ISO/IEC 27001