Results 191 to 200 of about 10,997 (203)
Some of the next articles are maybe not open access.
Zenith Blueprint: The Integrated ISO 27001:2022 Compliance Roadmap
The Zenith Blueprint is a structured 30-step methodology designed to help small and mid-sized organisations build practical, evidence-driven security governance aligned with ISO/IEC 27001:2022. It integrates organisational, technical, and operational measures into a single, actionable roadmap suitable for early-stage ISMS programmes as well as maturingopenaire +1 more source
Information security and value creation: The performance implications of ISO/IEC 27001
Computers in industry (Print), 2022Matteo Podrecca +3 more
semanticscholar +1 more source
Information security management: a fuzzy DEMATEL analysis of the new ISO/IEC 27001:2022 controls
Information & Computer SecurityPurpose This paper aims to analyze the cause-and-effect relationship and the level of influence between the 11 new information security controls proposed by ISO/IEC 27001:2022. Design/methodology/approach A survey with 22 experts, all chief ...
Reginaldo da Silva Leme +6 more
openaire +1 more source
ISO/IEC 27001:2022 - Ein verlässlicher Kompass für die NIS-2-Anforderungen?
Das Ziel dieser Bachelorarbeit ist die Untersuchung der folgenden Forschungsfrage: Inwieweit erfüllen die Anforderungen der Norm ISO/IEC 27001:2022 die organisatorischen, personellen, physischen und technologischen Anforderungen, die durch die NIS2-Richtlinie an Einrichtungen gestellt werden?openaire +1 more source
Evaluation of Information Security Readiness Using the KAMI Index 5.0 and ISO/IEC 27001:2022
Progresif: Jurnal Ilmiah Komputer<p><em>Information security evaluation is a crucial process for organizations to assess their level of readiness and to establish clear security management roles and responsibilities. Higher education institutions, such as Tuanku Tambusai University of Heroes, have significant responsibilities in safeguarding sensitive data. The institution
Beri Novriyadi +3 more
openaire +1 more source
Computer systems and network
The problem of developing new methods and vectors of attacks on critical infrastructure and responding to emerging threats through the implementation of recognized standards in the field of information security such as ISO 27001 was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and in particular the main changes in
Y. Kurii, I. Opirskyy
openaire +1 more source
The problem of developing new methods and vectors of attacks on critical infrastructure and responding to emerging threats through the implementation of recognized standards in the field of information security such as ISO 27001 was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and in particular the main changes in
Y. Kurii, I. Opirskyy
openaire +1 more source
Management of enterprise cyber security: A review of ISO/IEC 27001:2022
2023 International Conference On Cyber Management And Engineering (CyMaEn), 2023openaire +1 more source

