BUREAU VERIFICATION SYSTEM (BVSGROUPS)

ISO 56002:2019

ISO 56002 addresses all established organizations regardless of industry and size, all types of innovation (products, services, processes, models and methods) and additionally all types of innovation approaches (internal and open innovation, user, market, technology and design-driven innovation activities). In particular, organizations that strive for sustainable success through innovation activities and want to improve their understanding of a holistic innovation management system are affected. This standard also focuses on users and customers

Server Hardening

System hardening is the process of securing a server or computer system by minimizing its attack surface, or surface of vulnerability, and potential attack vectors. It’s a form of cyberattack protection that involves closing system loopholes that cyberattackers frequently use to exploit the system and gain access to users’ sensitive data. One official definition of system hardening, according to the National Institute of Standards and Technology (NIST), is that it’s “a process intended to eliminate a means of attack by patching vulnerabilities and turning off non-essential services.”

ITGC/ITAC Audit

CISA The CISA is a globally reputed certification for security professionals who audit, monitor, and assess organizations’ information systems and business operations. The certification showcases the candidate’s auditing experience, knowledge, and skills to evaluate vulnerabilities, report on compliance, and institute controls within the enterprise. Organizations require audit professionals who possess the knowledge and expertise to identify critical issues and security challenges. The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession.

Cyber Law

Cybercrime continues to evolve. Although something clearly needs to be done, there is growing concern that proposed action to tackle this is at the expense of fundamental human rights and that there are serious risks to the open and free internet. As the deadline of 29 October 2021 approaches for countries to submit input to the United Nations ahead of the January negotiations at the UN for a Cybercrime Convention, the CyberPeace Institute and its industry partners assembled under the Cybersecurity TechAccord initiative, have published the Multi-Stakeholder Manifesto. The principles outlined in the Manifesto are considered key to reflect human-centric principles in any cyber crime legislation.

ISO 27001 (ISMS) ISO 27001 is an internationally recognized standard that sets out a risk-based methodology for organizations to manage information security through the implementation of an Information Security Management System (ISMS); and a systematic approach to implementing, operating, and maintaining information security within an organization.

ISO 27701 (PIMS)

ISO/IEC 27701 will help you manage Personally Identifiable Information (PII) within your organisation. It’s a new standard, designed for use by anyone responsible for PII in any sort of organisation. The standard shows you how to design, set up, manage and continually improve a Privacy Information Management System (PIMS). It gives you a lot of flexibility in how you create and run your PIMS. ISO 27701’s flexibility will help you follow any relevant local PII regulations.

ISO 27017 (Cloud Security) ISO/IEC 27017:2015 is an information security code of practise for cloud services. It’s an extension to ISO/IEC 27001:2013 and ISO/IEC 27002, and it provides additional security controls for cloud service providers and for cloud service customers. An organisation implementing the standard would select the relevant controls for their circumstances.

ISO 27018 (Protection of PII)

• Help the public cloud PII processor meet their obligations, including when they’re under contract to provide public cloud services • Enable transparency, so prospective cloud service customers can access secure, well managed cloud-based PII processing services • Help cloud services and users establish contractual agreements for processing PII • Give cloud service customers an audit and compliance methodology