Associated with CompleteIT Consulting LLC.
Project Initiation (scope, sponsorship, implementation team, establishing Timelines)
Conduct Initial Risk Assessment
Develop an Information Security Policy - management approval, Educate employees/stakeholders
Gap Analysis, and ISMS Documentation (Policy, Risk Assessment, SoA, Risk Treatment Plan
Define the ISMS Framework -- RTP, Roles & Responbilities
Implementation of Security Controls, Control Procedures, Staff Training
Monitoring and Measuring Effectiveness -- IA, Management Review
Continuous Improvements Process
Certification --- Pre-Certification Review, ISO 27001 Certification Audit, Remediate, Maintain Certification through annual Audit and Continuous monitoring