Information Security (ISO 27001)

Detecting and managing information security risks aims to identify those risks which jeopardise the company’s data assets.

Challenges facing Information Security Management

  • to determine those threats which are capable of exploiting the vulnerability of the company’s resources
  • to detect the vulnerability of each separate resource
  • to analyse only those resources which manage valuable data
  • to take account of existing protection measures in calculating risks
  • to clearly demonstrate any residual risk once risk management plans have been implemented
  • to support the various standards in accordance with the prevailing compliance conditions in the area of data security (ISO 27001)
One specific area of information security is the protection of personal data, which is governed by Regulation (EU) No 2016/679 of the European Parliament and of the Council. Find out how ADAPTO supports general privacy policy.

Information Security Risk Management dashboard

 

  • declaration of risk acceptance
  • identified risks
  • risk treatment plans
  • ISO 27001 Statement of Applicability
  • compliance with ISO 27001
  • GDPR support
 

Excel and Word

Automatic collection of vulnerable data based on vulnerability of resources

Integrated ISO 27005 list of threats
Generation of Applicability Statement in accordance with ISO 27001 Annex “A”
Use of methodologies which support Business Impact Analysis (CRAMM, FMEA)