There are many reasons for implementing an information security management system (ISMS), and identifying and understanding interested parties is crucial for an organisation to develop its information security. What is an ISMS? A system of processes, people and technology that …
Before beginning your data mapping exercise, you need to identify the personal data you hold. Personal data is any information that can directly or indirectly identify a natural person. The General Data Protection Regulation (GDPR) places much stronger controls on …
An ISO 27001 risk assessment is at the core of your organisation’s information security management system (ISMS). Those new to tackling this complex step may rely on using a manual, inexpensive solution such as spreadsheets, but there are many disadvantages …
Our sales and support executive Gary Baxter, has produced an extended demonstration video for our risk assessment software vsRisk 3.0. The aim of the video is to walk you through the software and help you decide whether it’s the right …
As part of your EU General Data Protection Regulation (GDPR) compliance project, your organisation will need to understand what personal data it processes. You will likely choose data mapping as a way to meet these requirements. Key elements of data …
Leading compliance software developer Vigilant Software has released a new and improved version of its Data Flow Mapping Tool based on early feedback. The aim of the Cloud-based tool – hosted on the CyberComply platform – is to simplify the …
Who is Vigilant Software? Vigilant Software is a global software company that aims to develop a range of software tools to accelerate and simplify your legal and compliance projects. Vigilant Software provides industry-leading software tools to support your ISO 27001 …
A risk treatment plan (RTP) is one of the mandatory reports that you will need to produce for your ISO 27001 information security management system (ISMS). What is a risk treatment plan? An RTP provides a summary of each of …
Data mapping will be a key part of your compliance project in the run-up to the EU General Data Protection Regulation (GDPR) compliance deadline of May 2018. The Regulation introduces numerous changes – and the change from complying with the …
With cyber attacks regularly making the headlines, there is growing pressure on regulators to root out organisations that fail to comply with their obligations to protect data. To stay secure and avoid regulatory action, organisations need to identify the laws …