ISO 27001 Implementation

CICRA has lead auditors in ISO 27000 series and a team of experts with international exposure who can supervise and lead your organization to achieve ISO 27001 standards. They will also provide post-standard consultations and testing for your organization.CICRA will also help your organization to achieve ISO standards in all 27000 series.

The ISO 27000 series of standards have been specifically reserved by ISO for information security matters. This of course, aligns with a number of other topics, including ISO 9000 (quality management) and ISO 14000 (environmental management).

ISO 27000 series will be populated with a range of individual standards and documents. A number of these are already well known, and indeed, have been published. Others are scheduled for publication, with final numbering and publication details yet to be determined.

At present, twenty-three of the standards in the series are published and available, while several more are still under development. The original ISO/IEC standards are sold directly by ISO, while sales outlets associated with various national standards bodies also sell various versions including local translations.

The ISO/IEC 27000-series

The ISO/IEC 27000-series (also known as the ‘ISMS Family of Standards’ or ‘ISO27k’ for short) comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC).

The series provides best practice recommendations on information security management, risks and controls within the context of an overall information security management system (ISMS), similar in design to management systems for quality assurance (the ISO 9000 series) and environmental protection (the ISO 14000 series).

The series is deliberately broad in scope, covering more than just privacy, confidentiality and IT or technical security issues. It is applicable to organizations of all shapes and sizes. All organizations are encouraged to assess their information security risks, then implement appropriate information security controls according to their needs, using the guidance and suggestions where relevant. Given the dynamic nature of information security, the ISMS concept incorporates continuous feedback and improvement activities, summarized by Deming’s “plan-do-check-act” approach, that seek to address changes in the threats, vulnerabilities or impacts of information security incidents.

The standards are the product of ISO/IEC JTC1 (Joint Technical Committee 1) SC27 (Subcommittee 27), an international body that meets in person twice a year.

Ethical Hackers Forum Gallery


register-now for training courses at CICRA


5marAll DayBachelor of Cyber SecurityDegree Programme