16 Apr ISO 27001 Certification | Category - Pivot Point Security A Key “Hidden” Lesson from the Sony Breach: You’re Only as Strong as Your Soft Controls January 19, 2024 By John Verry Throughout 2014 and into 2015 with the recent Anthem Blue Cross breach, every few weeks with distressing regularity there has been a ne... Continue reading
10 Nov ISO 27001 Certification | Category - Pivot Point Security Does ISO 27001:2013 Adequately Address Threats from Government Agencies? January 18, 2024 By Richard Barrus A new version of the ISO 27001 information security standard came out about a year ago. While the new release addresses some of the ch... Continue reading
22 Oct ISO 27001 Certification | Category - Pivot Point Security Here’s Why Using Information Security Policy Templates for ISO 27001 Certification Isn’t A Good Idea January 18, 2024 By Richard Barrus Clients often ask me whether they can make their lives easier by using information security policy templates to document compliance wit... Continue reading
14 Oct ISO 27001 Certification | Category - Pivot Point Security Include Domain Name Ransom or Cybersquatting in Your ISO 27001 Risk Assessment October 14, 2014 By John Verry ISO 27001 works great—assuming that you are great at risk assessment. If you miss a risk, you may be vulnerable, and unfortunately som... Continue reading
09 Sep ISO 27001 Certification | Category - Pivot Point Security Leveraging an Existing SOC 2 to Simplify ISO 27001 Certification January 19, 2024 By John Verry What is the most efficient way to get ISO 27001 certified if you already have your SOC 2 attestation? It’s not uncommon for an organiz... Continue reading