We think that the new version of NIST’s Cyber Security Framework is a significant improvement. There’s one big change, but it is the lots of little changes that add up to a massive overall improvement. New Zealand organisations will still need to do some work to plug some of its idiosyncratic gaps, however.
Axenic is proud to announce our new product offering which will substantially improve security at government agencies!
Government agencies have been telling us for years that they have struggled to implement the cable colour standards in the NZISM. Hampered by the fact that they don’t own the data centres, that it is hard to discover which cables are carrying which traffic, and that many of the data centres are overseas – agencies have given up. No longer!
In my previous two articles in this series focused on developing an Information Security Management System (ISMS) based on ISO 27001:2013, I presented the common myths associated with the standard. In this article, I am going to provide an overview of the standard and section 4 Context of the organisation.
Okay, I know I promised to delve into and discuss the requirements defined in 4 Context of the organisation. However, I realised that they are other common myths that I should dispel for those of you that are interested in implementing an Information Security Management System (ISMS) that conforms with ISO/IEC 27001:2013 (ISO 27001).