My last blog post addressed identifying stakeholders when you run your own IT (Information Technology) show. However, the IT landscape is shifting rapidly and a large number of organisations are moving parts of their IT towards cloud providers. How does this change the scope of our cybersecurity strategy? This fourth article is a bit of […]
Cyberlink Security Blog
Who are my Cyber Stakeholders?
This is the third article in a blog series I started to find out, together with the members of the ISO27001 group on LinkedIn, how you can use ISO27001 ISMS to build your Cybersecurity strategy. In this post I would like to explore with you how we can identify our stakeholders and their interests and how […]
Why should my organisation have a cybersecurity strategy?
This is the second article in a series exploring, together with the members of the ISO27001 group on LinkedIn, how you can use ISO27001 ISMS to build your Cybersecurity strategy. Although Cybersecurity has become a bit of a ‘catch all’ phrase, I interpret it as anything related to protecting your digital assets (see my previous […]
Is ISO27001 a good basis for your Cyber Security Strategy?
In this series of posts I would like to explore how you might use ISO27001 as a solid foundation for your cyber security strategy. An ISO 27001 certification demonstrates the conformity of your company’s ISMS with the documented standards, so is an essential part of your cyber security. My name is Arthur Donkers and my […]
PECB United Kingdom has signed a partnership agreement with CyberLink
PECB United Kingdom has signed a partnership agreement with CyberLink