Information Security Management

Find articles about Information Security Management
Becoming Compliant: .legal's ISAE 3000 & ISAE 3402
Information Security Management › ISAE

Becoming Compliant: .legal's ISAE 3000 & ISAE 3402

Learn how we at .legal A/S work stay ISAE certified with ISAE 3000 type 2 and ISAE 3402 type 2.

Read More arrow
What is a ISAE 3402 declarations
Information Security Management › ISAE

What is a ISAE 3402 declarations

Learn the basics of the ISAE 3402, such as how an audit takes places and how you get the certification.

Read More arrow
What is a ISAE 3000 declarations
Information Security Management › ISAE

What is a ISAE 3000 declarations

This article describes what an ISAE 3000 statement is and how it can be used to demonstrate GDPR compliance.

Read More arrow
What is ISO27001 Compliance?
Information Security Management › ISO2700X

What is ISO27001 Compliance?

Learn the basics of ISO27001 and how to comply with the international standard.

Read More arrow
ISO Compliance Checklist
Information Security Management › ISO2700X

ISO Compliance Checklist

Learn the basics of how to implement ISO27001, and how to achieve ISO27001 certification.

Read More arrow
Introduction to Information Security Management Systems (ISMS)
Information Security Management › ISMS

Introduction to Information Security Management Systems (ISMS)

Discover what ISMS means, explore information security management benefits, and learn how to implement ISMS in your organisation with our comprehensive guide.

Read More arrow
What is the difference between Information Security & Cybersecurity?
Information Security Management › ISMS

What is the difference between Information Security & Cybersecurity?

Information security relates to protecting all information in your organization, whether on paper or online. Cybersecurity relates to the 'digital' security of your organization.

Read More arrow
Information Security in Healthcare
Information Security Management › ISMS

Information Security in Healthcare

Read More arrow
Vendor audits
Information Security Management › Audits

Vendor audits

In this article, we look at how you can effectively oversee your suppliers’ IT security, protect your business, and meet the requirements of GDPR, NIS2, and ISO 27001.

Read More arrow
+400 companies use .legal
Region Sjælland
Aarhus Universitet
aj_vaccines_logo
Realdania
Right People
IO Gates
PLO
Finans Danmark
geia-food
Vestforbrænding
Evida
Klasselotteriet
NRGI1
BLUE WATER SHIPPING
Karnov
Ingvard Christensen
VP Securities
AH Industries
Lægeforeningen
InMobile
AK Nygart
ARP Hansen
DEIF
DMJX
Axel logo
qUINT Logo
KAUFMANN (1)
SMILfonden-logo
kurhotel_skodsborg
nemlig.com
Molecule Consultancy
Novicell