ISACA Germany at usd AG

14. September 2017

28 August 2017
Representatives of the Information Security Expert Group of the ISACA Germany Chapter e.V.* came together at usd headquarters in Neu-Isenburg last week.
Andrea Rupprich, Managing Consultant with usd, has been supporting the ISACA Germany Chapter e.V. working with the expert group for years. She is one of about 20 members who share their practical experiences with security operations in their companies based in different industries. Their work focuses on information security management. The latest session revolved around the “Security Speedometer”, a model that helps a businesses’ management control and optimise information security processes based on security key indicators.
Following the great interest in the Implementation Guideline ISMS developed by the expert group, an English translation of the guideline has recently been released. The implementation guideline was designed for organisations that are operating or planning to establish an information security management system according to international standards ISO/IEC 27001:2013 1. Apart from pragmatic support and advice, the guideline highlights the advantages of a customised and standard-compliant ISMS.
The English guideline can be downloaded from the website of the ISACA Germany Chapter e.V. free of charge.
*ISACA® Germany Chapter e.V. is the German professional association of IT auditors, IT security managers and IT governance officers.

Also interesting:

3 Reasons for a Cloud Security Audit

3 Reasons for a Cloud Security Audit

Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the corresponding IT departments. The technologies and processes of a cloud environment differ from those of local data centers....

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate security. They increasingly identify the same vulnerabilities in different IT assets, some of which have been known for...

Categories

Categories