May 16 2025

C-I-A + 2: The Full Spectrum of Information Security

Category: Information Securitydisc7 @ 8:43 am

The five pillars of information security form the foundation for designing and evaluating security policies, systems, and processes. In a world driven by AI, the pillars of information security remain essential…


1. Confidentiality

Definition: Ensuring that information is accessible only to those authorized to access it.
Goal: Prevent unauthorized disclosure of data.
Controls & Examples:

  • Encryption (e.g., AES for data at rest or TLS for data in transit)
  • Access controls (e.g., role-based access, multifactor authentication)
  • Data classification and labeling
  • VPNs for secure remote access


2. Integrity

Definition: Assuring the accuracy and completeness of data and system configurations.
Goal: Prevent unauthorized modification or destruction of information.
Controls & Examples:

  • Hashing (e.g., SHA-256 to verify file integrity)
  • Digital signatures
  • Audit logs
  • File integrity monitoring systems


3. Availability

Definition: Ensuring that information and systems are accessible to authorized users when needed.
Goal: Minimize downtime and ensure reliable access to critical systems.
Controls & Examples:

  • Redundant systems and failover clusters
  • Backup and disaster recovery plans
  • Denial-of-service (DoS) protection
  • Regular patching and maintenance


4. Authenticity

Definition: Verifying that users, systems, and data are genuine.
Goal: Ensure that communications and data originate from a trusted source.
Controls & Examples:

  • Digital certificates and Public Key Infrastructure (PKI)
  • Two-factor authentication
  • Biometric verification
  • Secure protocols like SSH, HTTPS


5. Non-repudiation

Definition: Ensuring that a party in a communication cannot deny the authenticity of their signature or the sending of a message.
Goal: Provide proof of origin and integrity to avoid disputes.
Controls & Examples:

  • Digital signatures with timestamps
  • Immutable audit logs
  • Secure email with signing and logging
  • Blockchain-based verification in advanced systems

Together, these five pillars help protect the confidentiality, accuracy, reliability, authenticity, and accountability of information systems and are essential for any organization’s risk management strategy.

Foundations of Information Security

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: CIA, Information Security


May 15 2025

From Oversight to Override: Enforcing AI Safety Through Infrastructure

Category: AI,Information Securitydisc7 @ 9:57 am

You can’t have AI without an IA

As AI systems become increasingly integrated into critical sectors such as finance, healthcare, and defense, their unpredictable and opaque behavior introduces significant risks to society. Traditional safety protocols may not be sufficient to manage the potential threats posed by highly advanced AI, especially those capable of causing existential harm. To address this, researchers propose Guillotine, a hypervisor-based architecture designed to securely sandbox powerful AI models.

Guillotine leverages established virtualization techniques but also introduces fundamentally new isolation strategies tailored for AI with existential-risk potential. Unlike typical software, such AI may attempt to analyze and subvert the very systems meant to contain them. This requires a deep co-design of hypervisor software with the underlying hardware—CPU, memory, network interfaces, and storage—to prevent side-channel leaks and eliminate avenues for reflective exploitation.

Beyond technical isolation, Guillotine incorporates physical fail-safes inspired by systems in nuclear power plants and aviation. These include hardware-level disconnection mechanisms and even radical approaches like data center flooding to forcibly shut down or destroy rogue AI. These physical controls offer a final layer of defense should digital barriers fail.

The underlying concern is that many current AI safety frameworks rely on policy rather than technical enforcement. As AI becomes more capable, it may learn to bypass or manipulate these soft controls. Guillotine directly confronts this problem by embedding enforcement into the architecture itself—creating systems that can’t be talked out of enforcing the rules.

In essence, Guillotine represents a shift from trust-based AI safety toward hardened, tamper-resistant infrastructure. It acknowledges that if AI is to be trusted with mission-critical roles—or if it poses existential threats—we must engineer control systems with the same rigor and physical safeguards used in other high-risk industries.

 Guillotine: Hypervisors for Isolating Malicious AIs.

Google‘s AI-Powered Countermeasures Against Cyber Scams

The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

The Role of AI in Modern Hacking: Both an Asset and a Risk

Businesses leveraging AI should prepare now for a future of increasing regulation.

NIST: AI/ML Security Still Falls Short

DISC InfoSec’s earlier post on the AI topic

Trust Me – ISO 42001 AI Management System

 Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps

What You Are Not Told About ChatGPT: Key Insights into the Inner Workings of ChatGPT & How to Get the Most Out of It

Digital Ethics in the Age of AI – Navigating the ethical frontier today and beyond

Artificial intelligence – Ethical, social, and security impacts for the present and the future

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: AIMS, AISafety, artificial intelligence, Enforcing AI Safety, GuillotineAI, information architecture, ISO 42001


May 15 2025

Coinbase data breach highlights significant vulnerabilities in the cryptocurrency industry

Coinbase‘s recent data breach, estimated to cost between $180 million and $400 million, wasn’t caused by a technological failure, but rather by a sophisticated social engineering attack. Cybercriminals bribed offshore support agents to obtain sensitive customer data, including personally identifiable information (PII), government IDs, bank details, and account information.

This highlights a critical breakdown in Coinbase‘s internal security, specifically in access control and oversight of its contractors. No cryptocurrency was stolen directly, but the exposure of such sensitive data poses significant risks to affected customers, including identity theft and financial fraud. The financial repercussions for Coinbase are substantial, encompassing remediation costs and customer reimbursements. The incident raises serious questions about the security practices within the cryptocurrency industry and whether the term “innovation” appropriately describes practices that expose users to such significant risks.

Impact and Fallout

While no cryptocurrency was stolen, the breach exposed sensitive customer information, such as names, bank account numbers, and routing numbers . This exposure poses risks of identity theft and fraud. Coinbase has estimated potential costs for cleanup and customer reimbursements to be between $180 million and $400 million. The breach has also led to increased regulatory scrutiny and potential legal challenges .

Broader Implications

This incident highlights a critical issue in the crypto industry: the reliance on human factors and inadequate security training. Despite advanced technological safeguards, human error remains a significant vulnerability. The breach was not due to a failure in technology but rather a breakdown in trust, access control, and oversight. It raises questions about the industry’s approach to security and whether current practices are sufficient to protect users .

Moving Forward

The Coinbase breach serves as a wake-up call for the crypto industry to reevaluate its security protocols, particularly concerning employee training and access controls. It underscores the need for robust security measures that address not only technological vulnerabilities but also human factors. As the industry continues to evolve, prioritizing comprehensive security strategies will be essential to maintain user trust and ensure the integrity of crypto platforms.

The scale of the breach and its potential long-term consequences for customers and the reputation of Coinbase are considerable, prompting discussions about necessary improvements in security protocols and regulatory oversight within the cryptocurrency space.

Coinbase faces $400M bill after insider phishing attack

Here are some countermeasures to prevent similar incidents from happening again.

To prevent future breaches like the recent Coinbase incident, a multi-pronged approach is necessary, focusing on both technological and human factors. Here’s a breakdown of potential countermeasures:

Enhanced Security Measures:

  • Multi-Factor Authentication (MFA): Implement robust MFA across all systems and accounts, making it mandatory for all employees and contractors. This adds an extra layer of security, making it significantly harder for unauthorized individuals to access accounts, even if they obtain credentials.
  • Zero Trust Security Model: Adopt a zero-trust architecture, assuming no user or device is inherently trustworthy. This involves verifying every access request, regardless of origin, using continuous authentication and authorization mechanisms.
  • Regular Security Audits and Penetration Testing: Conduct frequent and thorough security audits and penetration testing to identify and address vulnerabilities before malicious actors can exploit them. These assessments should cover all systems, applications, and infrastructure components.
  • Employee Training and Awareness Programs: Implement comprehensive security awareness training programs for all employees and contractors. This should cover topics like phishing scams, social engineering tactics, and safe password practices. Regular refresher courses are essential to maintain vigilance.
  • Access Control and Privileged Access Management (PAM): Implement strict access control policies, limiting access to sensitive data and systems based on the principle of least privilege. Use PAM solutions to manage and monitor privileged accounts, ensuring that only authorized personnel can access critical systems.
  • Data Loss Prevention (DLP): Deploy DLP tools to monitor and prevent sensitive data from leaving the organization’s control. This includes monitoring data transfers, email communications, and cloud storage access.
  • Blockchain-Based Security Solutions: Explore the use of blockchain technology to enhance security. This could involve using blockchain for identity verification, secure data storage, and tamper-proof audit trails.
  • Threat Intelligence and Monitoring: Leverage threat intelligence feeds and security information and event management (SIEM) systems to proactively identify and respond to potential threats. This allows for early detection of suspicious activity and enables timely intervention.

Improved Contractor Management:

  • Background Checks and Vetting: Conduct thorough background checks and vetting processes for all contractors, particularly those with access to sensitive data. This should include verifying their identity, credentials, and past employment history.
  • Contractual Obligations: Clearly define security responsibilities and liabilities in contracts with contractors. Include clauses outlining penalties for data breaches and non-compliance with security policies.
  • Regular Monitoring and Oversight: Implement robust monitoring and oversight mechanisms to track contractor activity and ensure compliance with security protocols. This could involve regular audits, access reviews, and performance evaluations.
  • Secure Communication Channels: Ensure that all communication with contractors is conducted through secure channels, such as encrypted email and messaging systems.

Regulatory Compliance:

  • Adherence to Data Protection Regulations: Strictly adhere to relevant data protection regulations, such as GDPR and CCPA, to ensure compliance with legal requirements and protect customer data.

By implementing these countermeasures, organizations can significantly reduce their risk of experiencing similar breaches and protect sensitive customer data.

The Ultimate Guide to Staying Safe from Cryptocurrency Scams and Hacks

From Cartels to Crypto: The digitalisation of money laundering

Lazarus APT Laundered Over $900 Million Worth of Cryptocurrency

Attackers hit software firm Retool to get to crypto companies and assets

7 Rules Of Risk Management For Cryptocurrency Users

Hackers use Rilide browser extension to bypass 2FA, steal crypto

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Coinbase, cryptocurrency


May 13 2025

AI is Powerful—But Risky. ISO/IEC 42001 Can Help You Govern It

Category: Information Security,ISO 27kdisc7 @ 2:56 pm

Managing AI Risks: A Strategic Imperative – responsibility and disruption must
coexist

Artificial Intelligence (AI) is transforming sectors across the board—from healthcare and finance to manufacturing and logistics. While its potential to drive innovation and efficiency is clear, AI also introduces complex risks that can impact fairness, transparency, security, and compliance. To ensure these technologies are used responsibly, organizations must implement structured governance mechanisms to manage AI-related risks proactively.

Understanding the Key Risks

Unchecked AI systems can lead to serious problems. Biases embedded in training data can produce discriminatory outcomes. Many models function as opaque “black boxes,” making their decisions difficult to explain or audit. Security threats like adversarial attacks and data poisoning also pose real dangers. Additionally, with evolving regulations like the EU AI Act, non-compliance could result in significant penalties and reputational harm. Perhaps most critically, failure to demonstrate transparency and accountability can erode public trust, undermining long-term adoption and success.

ISO/IEC 42001: A Framework for Responsible AI

To address these challenges, ISO/IEC 42001—the first international AI management system standard—offers a structured, auditable framework. Published in 2023, it helps organizations govern AI responsibly, much like ISO 27001 does for information security. It supports a risk-based approach that accounts for ethical, legal, and societal expectations.

Key Components of ISO/IEC 42001

  • Contextual Risk Assessment: Tailors risk management to the organization’s specific environment, mission, and stakeholders.
  • Defined Governance Roles: Assigns clear responsibilities for managing AI systems.
  • Life Cycle Risk Management: Addresses AI risks across development, deployment, and ongoing monitoring.
  • Ethics and Transparency: Encourages fairness, explainability, and human oversight.
  • Continuous Improvement: Promotes regular reviews and updates to stay aligned with technological and regulatory changes.

Benefits of Certification

Pursuing ISO 42001 certification helps organizations preempt security, operational, and legal risks. It also enhances credibility with customers, partners, and regulators by demonstrating a commitment to responsible AI. Moreover, as regulations tighten, ISO 42001 provides a compliance-ready foundation. The standard is scalable, making it practical for both startups and large enterprises, and it can offer a competitive edge during audits, procurement processes, and stakeholder evaluations.

Practical Steps to Get Started

To begin implementing ISO 42001:

  • Inventory your existing AI systems and assess their risk profiles.
  • Identify governance and policy gaps against the standard’s requirements.
  • Develop policies focused on fairness, transparency, and accountability.
  • Train teams on responsible AI practices and ethical considerations.

Final Recommendation

AI is no longer optional—it’s embedded in modern business. But its power demands responsibility. Adopting ISO/IEC 42001 enables organizations to build AI systems that are secure, ethical, and aligned with regulatory expectations. Managing AI risk effectively isn’t just about compliance—it’s about building systems people can trust.

The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

The 12–24 Month Timeline Is Logical

Planning AI compliance within the next 12–24 months reflects:

  • The time needed to inventory AI use, assess risk, and integrate policies
  • The emerging maturity of frameworks like ISO 42001, NIST AI RMF, and others
  • The expectation that vendors will demand AI assurance from partners by 2026

Companies not planning to do anything (the 6%) are likely in less regulated sectors or unaware of the pace of change. But even that 6% will feel pressure from insurers, regulators, and B2B customers.

Here are the Top 7 GenAI Security Practices that organizations should adopt to protect their data, users, and reputation when deploying generative AI tools:


1. Data Input Sanitization

  • Why: Prevent leakage of sensitive or confidential data into prompts.
  • How: Strip personally identifiable information (PII), secrets, and proprietary info before sending input to GenAI models.


2. Model Output Filtering

  • Why: Avoid toxic, biased, or misleading content from being released to end users.
  • How: Use automated post-processing filters and human review where necessary to validate output.


3. Access Controls & Authentication

  • Why: Prevent unauthorized use of GenAI systems, especially those integrated with sensitive internal data.
  • How: Enforce least privilege access, strong authentication (MFA), and audit logs for traceability.


4. Prompt Injection Defense

  • Why: Attackers can manipulate model behavior through cleverly crafted prompts.
  • How: Sanitize user input, use system-level guardrails, and test for injection vulnerabilities during development.


5. Data Provenance & Logging

  • Why: Maintain accountability for both input and output for auditing, compliance, and incident response.
  • How: Log inputs, model configurations, and outputs with timestamps and user attribution.


6. Secure Model Hosting & APIs

  • Why: Prevent model theft, abuse, or tampering via insecure infrastructure.
  • How: Use secure APIs (HTTPS, rate limiting), encrypt models at rest/in transit, and monitor for anomalies.


7. Regular Testing and Red-Teaming

  • Why: Proactively identify weaknesses before adversaries exploit them.
  • How: Conduct adversarial testing, red-teaming exercises, and use third-party GenAI security assessment tools.

ISO/IEC 42001:2023, First Edition: Information technology – Artificial intelligence – Management system

ISO 42001 Artificial Intelligence Management Systems (AIMS) Implementation Guide: AIMS Framework | AI Security Standards

Businesses leveraging AI should prepare now for a future of increasing regulation.

DISC InfoSec’s earlier post on the AI topic

Feel free to get in touch if you have any questions about the ISO 42001 Internal audit or certification process.

NIST: AI/ML Security Still Falls Short

Trust Me – ISO 42001 AI Management System

AI Management System Certification According to the ISO/IEC 42001 Standard

 Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps

What You Are Not Told About ChatGPT: Key Insights into the Inner Workings of ChatGPT & How to Get the Most Out of It

Digital Ethics in the Age of AI – Navigating the ethical frontier today and beyond

Artificial intelligence – Ethical, social, and security impacts for the present and the future

“AI Regulation: Global Challenges and Opportunities”

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: AIMS, Governance, ISO 42001


May 13 2025

Becoming a Complete vCISO: Driving Maximum Value and Business Alignment

Category: CISO,vCISOdisc7 @ 10:13 am

As cyber threats become more frequent and complex, many small and medium-sized businesses (SMBs) find themselves unable to afford a full-time Chief Information Security Officer (CISO). Enter the Virtual CISO (vCISO)—a flexible, cost-effective solution that’s rapidly gaining traction. For Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs), offering vCISO services isn’t just a smart move—it’s a major business opportunity.

Why vCISO Services Are Gaining Ground

With cybersecurity becoming a top priority across industries, demand for expert guidance is soaring. Many MSPs have started offering partial vCISO services—helping with compliance or risk assessments. But those who provide comprehensive vCISO offerings, including security strategy, policy development, board-level reporting, and incident management, are reaping higher revenues and deeper client trust.

The CISO’s Critical Role

A traditional CISO wears many hats: managing cyber risk, setting security strategies, ensuring compliance, and overseeing incident response and vendor risk. They also liaise with leadership, align IT with business goals, and handle regulatory requirements like GDPR and HIPAA. With experienced CISOs in short supply and expensive to hire, vCISOs are filling the gap—especially for SMBs.

Why MSPs Are Perfectly Positioned

Most SMBs don’t have a dedicated internal cybersecurity leader. That’s where MSPs and MSSPs come in. Offering vCISO services allows them to tap into recurring revenue streams, enter new markets, and deepen client relationships. By going beyond reactive services and offering proactive, executive-level security guidance, MSPs can differentiate themselves in a crowded field.

Delivering Full vCISO Services: What It Takes

To truly deliver on the vCISO promise, providers must cover end-to-end services—from risk assessments and strategy setting to business continuity planning and compliance. A solid starting point is a thorough risk assessment that informs a strategic cybersecurity roadmap aligned with business priorities and budget constraints.

It’s About Action, Not Just Advice

A vCISO isn’t just a strategist—they’re also responsible for guiding implementation. This includes deploying controls like MFA and EDR tools, conducting vulnerability scans, and ensuring backups and disaster recovery plans are robust. Data protection, archiving, and secure disposal are also critical to safeguarding digital assets.

Educating and Enabling Everyone

Cybersecurity is a team sport. That’s why training and awareness programs are key vCISO responsibilities. From employee phishing simulations to executive-level briefings, vCISOs ensure everyone understands their role in protecting the business. Meanwhile, increasing compliance demands—from clients and regulators alike—make vCISO support in this area invaluable.

Planning for the Worst: Incident & Vendor Risk Management

Every business will face a cyber incident eventually. A strong incident response plan is essential, as is regular practice via tabletop exercises. Additionally, third-party vendors represent growing attack vectors. vCISOs are tasked with managing this risk, ensuring vendors follow strict access and authentication protocols.

Scale Smart with Automation

With the rise of automation and the widespread emergence of agentic AI, are you prepared to navigate this disruption responsibly? Providing all these services can be daunting—especially for smaller providers. That’s where platforms like Cynomi come in. By automating time-consuming tasks like assessments, policy creation, and compliance mapping, Cynomi enables MSPs and MSSPs to scale their vCISO services without hiring more staff. It’s a game-changer for those ready to go all-in on vCISO.


Conclusion:
Delivering full vCISO services isn’t easy—but the payoff is big. With the right approach and tools, MSPs and MSSPs can offer high-value, scalable cybersecurity leadership to clients who desperately need it. For those ready to lead the charge, the time to act is now.

DISC Infosec vCISO Services

How CISO’s are transforming the Third-Party Risk Management

Cybersecurity and Third-Party Risk: Third Party Threat Hunting

Navigating Supply Chain Cyber Risk 

DISC InfoSec offer free initial high level assessment – Based on your needs DISC InfoSec offer ongoing compliance management or vCISO retainer.

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Fractional CISO, vCISO, vCISO services


May 12 2025

Historical data on the number of ISO/IEC 27001 certifications by country across the Globe

Category: ISO 27kdisc7 @ 10:03 am

ISO/IEC 27001 certifications by country worldwide reveals significant trends in information security management. Here’s a comprehensive overview based on the latest available information:

Key Insights on ISO/IEC 27001 Certifications Globally

  1. Global Trends:
    • The number of ISO/IEC 27001 certifications has been steadily increasing, reflecting a growing emphasis on information security across various sectors.
    • Countries with robust technology sectors and regulatory frameworks tend to have higher certification numbers.
  2. Top Countries by Certifications:
    • China: Leads the world with the highest number of ISO/IEC 27001 certifications, driven by its vast technology and manufacturing sectors.
    • Japan: Consistently ranks high, showcasing a strong commitment to information security.
    • United Kingdom: A significant player in the certification landscape, particularly in finance and technology.
    • India: Rapid growth in certifications, especially in IT and service industries.
    • Italy: Notable for its increasing number of certifications, particularly in the manufacturing and service sectors.

the top ten countries with the most ISO/IEC 27001 certifications based on the latest available data:

RankCountryNumber of Certifications
1China295,501
2Japan20,892
3Italy20,294
4United Kingdom18,717
5Spain14,778
6South Korea13,439
7Germany13,383
8India12,562
9France10,000
10Brazil9,500

  1. Historical Data Overview:
    • The ISO Survey provides annual updates on the number of valid certificates issued for various ISO management standards, including ISO/IEC 27001.
    • Recent reports indicate a steady increase in certifications from 2021 to 2024, with projections suggesting continued growth through 2033.

Notable Statistics from Recent Reports

  • ISO Survey 2022:
    • The report highlighted that over 50,000 ISO/IEC 27001 certificates were issued globally, with significant contributions from the top countries mentioned above.
  • Growth Rate:
    • The annual growth rate of certifications has been approximately 10-15% in recent years, indicating a strong trend towards adopting information security standards.

Resources for Detailed Data

  • ISO Survey: This annual report provides comprehensive statistics on ISO certifications by country and standard.
  • Market Reports: Various market analysis reports offer insights into certification trends and forecasts.
  • Compliance Guides: Websites like ISMS.online provide jurisdiction-specific guides detailing compliance and certification statistics.

The landscape of ISO/IEC 27001 certifications is dynamic, with significant growth observed globally. For the most accurate and detailed historical data, consulting the ISO Survey and specific market reports will be beneficial. If you have a particular country in mind or need more specific data, feel free to ask! 😊

ISO/IEC 27001 Certification Trends in Asia

ISO’s annual surveys show that information-security management (ISO/IEC 27001) certification in Asia has grown strongly over the past decade, led by China, Japan and India. For example, China’s count rose from 8,356 certificates in 2019 (scribd.com) to 26,301 in 2022 (scribd.com) (driven by rapid uptake in large enterprises and government sectors), before dropping to 4,108 in 2023 (when China’s accreditation body did not report data) (oxebridge.com). Japan’s figures were more moderate: 5,245 in 2019, 6,987 in 2022 (scribd.com), and 5,599 in 202 (scribd.com). India’s counts have steadily climbed as well (2,309 in 2019 (scribd.com) to 2,969 in 2022 (scribd.com) and 3,877 in 2023 (scribd.com). Other Asian countries show similar upward trends: for instance, Indonesia grew from 274 certs in 2019 (scribd.com) to 783 in 2023 (scribd.com).

Country20192020202120222023
China8,35612,40318,44626,3014,108
Japan5,2455,6456,5876,9875,599
India2,3092,2262,7752,9693,877
Indonesia274542702822783
Others (Asia)

Table: Number of ISO/IEC 27001 certified organizations by country (Asia), year-end totals from ISO surveys (scribd.comscribd.comscribd.com). (China’s 2023 data is low due to missing report (oxebridge.com.)

Top Asian Countries

  • China: Historically the largest ISO/IEC 27001 market in Asia. Its certificate count surged through 2019–22 (scribd.comscribd.com) before the 2023 reporting gap.
  • Japan: Consistently the #2 in Asia. Japan had 5,245 certs in 2019 and ~6,987 by 2022 (scribd.com), dipping to 5,599 in 2023 (scribd.com).
  • India: The #3 Asian country. India grew from 2,309 (2019) (scribd.com) to 2,969 (2022) (scribd.com) and 3,877 (2023) (scribd.com). This reflects strong uptake in IT and financial services.
  • Others: Other notable countries include Indonesia (grew from 274 certs in 2019 to 783 in 2023 (scribd.comscribd.com), Malaysia and Singapore (each a few hundred certs), South Korea (hundreds to low-thousands), Taiwan (700+ certs by 2019) and several Middle Eastern nations (e.g. UAE, Saudi Arabia) that have adopted ISO 27001 in financial/government sectors.

These leading Asian countries typically mirror global trends, but regional factors matter: the huge 2022 jump in China likely reflects aggressive national cybersecurity initiatives. Conversely, the 2023 data distortion underscores how participation (reporting) can affect totals (oxebridge.com).

Sector Adoption

Across Asia, key industries driving ISO/IEC 27001 adoption are those with high information security needs. Market analyses note that IT/telecommunications, banking/finance (BFSI), healthcare and manufacturing are the biggest ISO 27001 markets. In practice, many Asian tech firms, financial institutions and government agencies (plus critical manufacturing exporters) have pursued ISO 27001 to meet regulatory and customer demands. For example, Asia’s financial regulators often encourage ISO 27001 for banks, and major telecom/IT companies in China, India and Japan routinely certify to it. This sectoral demand underpins the regional growth shown above businessresearchinsights.com.

Overall, the ISO data shows a clear upward trend for Asia’s top countries, with China historically leading and countries like India and Japan steadily catching up. The only major recent anomaly was China’s 2023 drop (an ISO survey artifact (oxebridge.com). The chart and table above summarize the year‑by‑year growth for these key countries, highlighting the continued expansion of ISO/IEC 27001 in Asia.

Sources: ISO Annual Survey reports and industry analyses (data as of 2019–2023). The ISO Survey notes that China’s 2023 data were incomplete

Understanding ISO 27001: Your Guide to Information Security

How to Leverage Generative AI for ISO 27001 Implementation

ISO27k Chat bot

If the GenAI chatbot doesn’t provide the answer you’re looking for, what would you expect it to do next?

If you don’t receive a satisfactory answer, please don’t hesitate to reach out to us — we’ll use your feedback to help retrain and improve the bot.


The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

ISO 27001’s Outdated SoA Rule: Time to Move On

ISO 27001 Compliance: Reduce Risks and Drive Business Value

ISO 27001:2022 Risk Management Steps


How to Continuously Enhance Your ISO 27001 ISMS (Clause 10 Explained)

Continual improvement doesn’t necessarily entail significant expenses. Many enhancements can be achieved through regular internal audits, management reviews, and staff engagement. By fostering a culture of continuous improvement, organizations can maintain an ISMS that effectively addresses current and emerging information security risks, ensuring resilience and compliance with ISO 27001 standards.

ISO 27001 Compliance and Certification

ISMS and ISO 27k training

Security Risk Assessment and ISO 27001 Gap Assessment

At DISC InfoSec, we streamline the entire process—guiding you confidently through complex frameworks such as ISO 27001, and SOC 2.

Here’s how we help:

  • Conduct gap assessments to identify compliance challenges and control maturity
  • Deliver straightforward, practical steps for remediation with assigned responsibility
  • Ensure ongoing guidance to support continued compliance with standard
  • Confirm your security posture through risk assessments and penetration testing

Let’s set up a quick call to explore how we can make your cybersecurity compliance process easier.

ISO 27001 certification validates that your ISMS meets recognized security standards and builds trust with customers by demonstrating a strong commitment to protecting information.

Difference Between Internal and External Audit

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

DISC InfoSec Previous posts on ISO27k

ISO certification training courses.

ISMS and ISO 27k training

Tags: iso 27001, iso 27001 certification


May 11 2025

Google‘s AI-Powered Countermeasures Against Cyber Scams

Category: AI,Cyber Attack,Cyber crime,Cyber Espionage,Cyber Threatsdisc7 @ 10:50 am

Google recently announced a significant advancement in its fight against online scams, leveraging the power of artificial intelligence. This initiative involves deploying AI-driven countermeasures across its major platforms: Chrome, Search, and Android. The aim is to proactively identify and neutralize scam attempts before they reach users.

Key Features of Google‘s AI-Powered Defense:

  • Enhanced Scam Detection: The AI algorithms analyze various data points, including website content, email headers, and user behavior patterns, to identify potential scams with greater accuracy. This goes beyond simple keyword matching, delving into the nuances of deceptive tactics.
  • Proactive Warnings: Users are alerted to potentially harmful websites or emails before they interact with them. These warnings are context-aware, providing clear and concise explanations of why a particular site or message is flagged as suspicious.
  • Improved Phishing Protection: AI helps refine phishing detection by identifying subtle patterns and linguistic cues often used by scammers to trick users into revealing sensitive information.
  • Cross-Platform Integration: The AI-powered security measures are seamlessly integrated across Google‘s ecosystem, providing a unified defense against scams regardless of the platform being used.

Significance of this Development:

This initiative signifies a crucial step in the ongoing battle against cybercrime. AI-powered scams are becoming increasingly sophisticated, making traditional methods of detection less effective. Google‘s proactive approach using AI is a promising development that could significantly reduce the success rate of these attacks and protect users from financial and personal harm. The cross-platform integration ensures a holistic approach, maximizing the effectiveness of the countermeasures.

Looking Ahead:

While Google‘s initiative is a significant step forward, the fight against AI-powered scams is an ongoing arms race. Cybercriminals constantly adapt their techniques, requiring continuous innovation and improvement in security measures. The future likely involves further refinements of AI algorithms and potentially the integration of other advanced technologies to stay ahead of evolving threats.

This news highlights the evolving landscape of cybersecurity and the crucial role of AI in both perpetrating and preventing cyber threats.

ISO/IEC 42001:2023, First Edition: Information technology – Artificial intelligence – Management system

ISO 42001 Artificial Intelligence Management Systems (AIMS) Implementation Guide: AIMS Framework | AI Security Standards

Businesses leveraging AI should prepare now for a future of increasing regulation.

DISC InfoSec’s earlier posts on the AI topic

NIST: AI/ML Security Still Falls Short

Trust Me – ISO 42001 AI Management System

AI Management System Certification According to the ISO/IEC 42001 Standard

 Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps

What You Are Not Told About ChatGPT: Key Insights into the Inner Workings of ChatGPT & How to Get the Most Out of It

Digital Ethics in the Age of AI – Navigating the ethical frontier today and beyond

Artificial intelligence – Ethical, social, and security impacts for the present and the future

“AI Regulation: Global Challenges and Opportunities”

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Cyber Scams


May 10 2025

Understanding ISO 27001: Your Guide to Information Security

Category: ISO 27kdisc7 @ 9:57 am

🌟 Today, let’s dive into the world of ISO 27001, a crucial standard for anyone or any organization interested in information security. If you’re looking to protect your organization’s data, this is the gold standard you need to know about!

What is ISO 27001?

ISO 27001 is an international standard that outlines the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It was first published in October 2005 and has been updated, with the latest version released in 2022.

Why is it Important?

  1. Risk Management: Helps organizations identify and manage risks to their information.
  2. Compliance: Assists in meeting legal and regulatory requirements.
  3. Trust: Builds confidence with clients and stakeholders by demonstrating a commitment to information security.

Key Components

  • Establishing an ISMS: Setting up a framework to manage sensitive information.
  • Continuous Improvement: Regularly updating and improving security measures.
  • Employee Training: Ensuring everyone in the organization understands their role in maintaining security.

Who Should Consider ISO 27001?

Any organization that handles sensitive information, from small businesses to large corporations, can benefit from ISO 27001. It’s especially relevant for sectors like finance, healthcare, and technology.

In a nutshell, ISO 27001 is all about safeguarding and protecting your information assets and ensuring that your organization is prepared for any security challenges that may arise. So, if you’re serious about protecting your data, this standard is definitely worth considering!

Got any questions about implementing ISO 27001 or how it can benefit your organization? Let’s chat!

Your Quick Guide to ISO 27001 Implementation Steps

Hey there! If you’re diving into the world of information security, you’ve probably heard of ISO 27001. It’s a big deal for organizations looking to protect their data. So, let’s break down the implementation steps in a casual way, shall we?

1. Get Management Buy-In

First things first, you need the support of your top management. This is crucial for securing resources and commitment.

2. Define the Scope

Next, outline what your Information Security Management System (ISMS) will cover. This helps in focusing your efforts.

3. Conduct a Risk Assessment

Identify potential risks to your information assets. This step is all about understanding what you need to protect.

4. Develop a Risk Treatment Plan

Once you know the risks, create a plan to address them. This could involve implementing new controls or improving existing ones.

5. Set Up Policies and Procedures

Document your security policies and procedures. This ensures everyone knows their roles and responsibilities.

6. Implement Controls

Put your risk treatment plan into action by implementing the necessary controls. This is where the rubber meets the road!

7. Train Your Team

Make sure everyone is on the same page. Conduct training sessions to educate your staff about the new policies and procedures.

8. Monitor and Review

Regularly check how well your ISMS is performing. This includes monitoring controls and reviewing policies.

9. Conduct Internal Audits

Schedule audits to ensure compliance with ISO 27001 standards. This helps identify areas for improvement.

10. Management Review

Hold a management review meeting to discuss the audit findings and overall performance of the ISMS.

11. Continuous Improvement

ISO 27001 is all about continuous improvement. Use the insights gained from audits and reviews to enhance your ISMS.

12. Certification

Finally, if you’re aiming for certification, prepare for an external audit. This is the final step to officially becoming ISO 27001 certified!

And there you have it! A quick and easy guide to implementing ISO 27001. Remember, it’s all about protecting your information and continuously improving your processes based on information security risks which align with your business objectives . Got any questions or need more details on a specific step? Just let us know!

How to Leverage Generative AI for ISO 27001 Implementation

ISO27k Chat bot

If the GenAI chatbot doesn’t provide the answer you’re looking for, what would you expect it to do next?

If you don’t receive a satisfactory answer, please don’t hesitate to reach out to us — we’ll use your feedback to help retrain and improve the bot.


The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

ISO 27001’s Outdated SoA Rule: Time to Move On

ISO 27001 Compliance: Reduce Risks and Drive Business Value

ISO 27001:2022 Risk Management Steps


How to Continuously Enhance Your ISO 27001 ISMS (Clause 10 Explained)

Continual improvement doesn’t necessarily entail significant expenses. Many enhancements can be achieved through regular internal audits, management reviews, and staff engagement. By fostering a culture of continuous improvement, organizations can maintain an ISMS that effectively addresses current and emerging information security risks, ensuring resilience and compliance with ISO 27001 standards.

ISO 27001 Compliance and Certification

ISMS and ISO 27k training

Security Risk Assessment and ISO 27001 Gap Assessment

At DISC InfoSec, we streamline the entire process—guiding you confidently through complex frameworks such as ISO 27001, and SOC 2.

Here’s how we help:

  • Conduct gap assessments to identify compliance challenges and control maturity
  • Deliver straightforward, practical steps for remediation with assigned responsibility
  • Ensure ongoing guidance to support continued compliance with standard
  • Confirm your security posture through risk assessments and penetration testing

Let’s set up a quick call to explore how we can make your cybersecurity compliance process easier.

ISO 27001 certification validates that your ISMS meets recognized security standards and builds trust with customers by demonstrating a strong commitment to protecting information.

Feel free to get in touch if you have any questions about the ISO 27001 Internal audit or certification process.

Successfully completing your ISO 27001 audit confirms that your Information Security Management System (ISMS) meets the required standards and assures your customers of your commitment to security.

Get in touch with us to begin your ISO 27001 audit today.

ISO 27001:2022 Annex A Controls Explained

Preparing for an ISO Audit: Essential Tips and Best Practices for a Successful Outcome

Is a Risk Assessment required to justify the inclusion of Annex A controls in the Statement of Applicability?

Many companies perceive ISO 27001 as just another compliance expense?

ISO 27001: Guide & key Ingredients for Certification

DISC InfoSec Previous posts on ISO27k

ISO certification training courses.

ISMS and ISO 27k training

Difference Between Internal and External Audit

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: InfoSec guide, iso 27001, iso 27001 certification


May 09 2025

How to Leverage Generative AI for ISO 27001 Implementation

Category: Information Security,ISO 27kdisc7 @ 12:45 pm

DISC’s guide on implementing ISO 27001 using generative AI highlights how AI technologies can streamline the establishment and maintenance of an Information Security Management System (ISMS). By leveraging AI tools, organizations can automate various aspects of the ISO 27001 implementation process, enhancing efficiency and accuracy.

AI-powered platforms like DISC InfoSec ISO27k Chatbot serve as intelligent knowledge bases, providing instant answers to queries related to ISO 27001 requirements, control implementations, and documentation. These tools assist in drafting necessary documents such as the Risk assessment and Statement of Applicability, and offer guidance on implementing Annex A controls. Additionally, AI can may facilitate training and awareness programs by generating tailored educational materials, ensuring that all employees are informed about information security practices.

The integration of AI into ISO 27001 implementation not only accelerates the process but also reduces the likelihood of errors, ensuring a more robust and compliant ISMS. By automating routine tasks and providing expert guidance, AI enables organizations to focus on strategic decision-making and continuous improvement in their information security management.

Hey I’m the digital assistance of DISC InfoSec for ISO 27k implementation.

I will try to answer your question. If I don’t know the answer, I will connect you with one my support agents.

Please click the link below to type your query regarding ISO 27001 (ISMS) implementation

ISO27k Chat bot

If the GenAI chatbot doesn’t provide the answer you’re looking for, what would you expect it to do next?

If you don’t receive a satisfactory answer, please don’t hesitate to reach out to us — we’ll use your feedback to help retrain and improve the bot.

The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

ISO 27001’s Outdated SoA Rule: Time to Move On

ISO 27001 Compliance: Reduce Risks and Drive Business Value

ISO 27001:2022 Risk Management Steps


How to Continuously Enhance Your ISO 27001 ISMS (Clause 10 Explained)

Continual improvement doesn’t necessarily entail significant expenses. Many enhancements can be achieved through regular internal audits, management reviews, and staff engagement. By fostering a culture of continuous improvement, organizations can maintain an ISMS that effectively addresses current and emerging information security risks, ensuring resilience and compliance with ISO 27001 standards.

ISO 27001 Compliance and Certification

ISMS and ISO 27k training

Security Risk Assessment and ISO 27001 Gap Assessment

At DISC InfoSec, we streamline the entire process—guiding you confidently through complex frameworks such as ISO 27001, and SOC 2.

Here’s how we help:

  • Conduct gap assessments to identify compliance challenges and control maturity
  • Deliver straightforward, practical steps for remediation with assigned responsibility
  • Ensure ongoing guidance to support continued compliance with standard
  • Confirm your security posture through risk assessments and penetration testing

Let’s set up a quick call to explore how we can make your cybersecurity compliance process easier.

ISO 27001 certification validates that your ISMS meets recognized security standards and builds trust with customers by demonstrating a strong commitment to protecting information.

Feel free to get in touch if you have any questions about the ISO 27001 Internal audit or certification process.

Successfully completing your ISO 27001 audit confirms that your Information Security Management System (ISMS) meets the required standards and assures your customers of your commitment to security.

Get in touch with us to begin your ISO 27001 audit today.

ISO 27001:2022 Annex A Controls Explained

Preparing for an ISO Audit: Essential Tips and Best Practices for a Successful Outcome

Is a Risk Assessment required to justify the inclusion of Annex A controls in the Statement of Applicability?

Many companies perceive ISO 27001 as just another compliance expense?

ISO 27001: Guide & key Ingredients for Certification

DISC InfoSec Previous posts on ISO27k

ISO certification training courses.

ISMS and ISO 27k training

Difference Between Internal and External Audit

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: GenAI, iso 27001


May 07 2025

Aligning Cybersecurity With Business Objectives Through Targeted Pen Testing

Category: Information Securitydisc7 @ 9:28 am

1. Understanding Objective-Based Penetration Testing
Objective-based penetration testing focuses on assessing an organization’s security by simulating real-world attack scenarios with specific goals in mind. Unlike traditional methods that might broadly scan for vulnerabilities, this approach targets particular objectives, such as accessing sensitive data or compromising critical systems, providing a more realistic evaluation of security posture.

2. The Importance of Realistic Threat Simulation
By emulating tactics used by actual threat actors, objective-based tests reveal how well an organization’s defenses can withstand targeted attacks. This method uncovers not just technical vulnerabilities but also weaknesses in processes and human factors, offering a comprehensive view of potential security gaps.

3. Enhancing Incident Response Preparedness
These targeted assessments help organizations evaluate and improve their incident response strategies. By observing how teams react to simulated breaches, companies can identify deficiencies in their response plans and training, leading to more effective real-world reactions to security incidents.

4. Aligning Security Measures with Business Objectives
Objective-based testing ensures that security evaluations are aligned with the organization’s specific goals and risk appetite. This alignment allows for more relevant and actionable insights, enabling businesses to prioritize security investments that protect their most critical assets.

5. Identifying Hidden Vulnerabilities
This approach is particularly effective at uncovering complex vulnerabilities that might be missed by standard testing methods. By focusing on achieving specific objectives, testers can identify intricate attack paths and chained exploits that pose significant risks.

6. Supporting Compliance and Regulatory Requirements
Objective-based penetration testing can aid in meeting various compliance standards by demonstrating a proactive approach to identifying and mitigating security risks. It provides documented evidence of security assessments tailored to the organization’s unique environment and threats.

7. Strengthening Overall Security Posture
By adopting objective-based penetration testing, organizations can gain deeper insights into their security strengths and weaknesses. This knowledge enables them to implement targeted improvements, enhance their resilience against cyber threats, and better protect their critical assets.

Penetration Testing Demystified: A Hands-on Introduction and Practical Guide: Your Keys to Security Tools and Techniques

Resilience at Risk: Overlooked Threats Every Leadership Team Should Know

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services


May 07 2025

Resilience at Risk: Overlooked Threats Every Leadership Team Should Know

They’re the quiet ones—the ones that will silently gut your continuity strategy while leadership watches the wrong fire.


1️⃣ Shadow SaaS Is Out of Control
Business units are adopting tools without IT oversight—no security, no backups, no DR.
It works… until it doesn’t. Then it becomes your problem.


2️⃣ RTOs Are Fiction, Not Strategy
“30 hours” looks good—until the CEO demands answers three hours in.
If your recovery needs a miracle, it’s not a plan. It’s a pending failure.


3️⃣ Resilience Theater Is Everywhere
Policies? Written. Boxes? Checked.
But when the real incident hits, no one knows what to do. You’ve got documentation, not readiness.


4️⃣ Hidden Dependencies Will Break You
APIs, scripts, microservices—no SLAs, no visibility, no accountability.
They fail quietly. Business halts. And no one saw it coming.


5️⃣ Continuity Teams Have Quiet Quit
Resilience professionals are exhausted, underfunded, and unheard.
Their silence isn’t safety—it’s burnout. And it’s dangerous.


🔶 Resilience doesn’t fail loudly. It erodes quietly.
CISOs and leadership teams: It’s time to stop watching the wrong fire.

Security and resilience. Business continuity management systems. Requirements

Cyber Resilience – Defence-in-depth principles

Becoming Resilient – The Definitive Guide to ISO 22301 Implementation: The Plain English, Step-by-Step Handbook for Business Continuity Practitioners

ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS)

ISO 22301 Free to read

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Cyber Resilience


May 06 2025

The CISOs You’re Overlooking Are the Ones Who Need You Most

Category: Information Securitydisc7 @ 2:16 pm

Coming off the back of RSA and I’m a little disheartened by some of the posts I’m seeing from startup founders about the countless meetings they’ve had with CISOs representing the fortune 500.

I get it. Landing an f500 customer does wonders for your brand, growth, funding, etc. But you do realize there is life beyond the f500 right? Or does your arrogance prevent you from acknowledging the thousands of companies, and CISOs within, who don’t have a glamour brand attached to their name?

If anything, those companies and CISOs are the ones who need you most. They are the ones operating with tight budgets, small teams, less resources, and huge levels of vulnerability. They need partners, and are turning to the startup ecosystem more and more in the hope of finding innovative tools that reduce their need for resources, and who cares more about building a long relationship vs a transaction.

Not taking anything away from the vendors whose products are attractive to the biggest brands on the planet. And certainly not taking anything away from the CISOs in f500 companies. But don’t neglect the greater CISO community. Treat everyone the same. Because once you’ve depleted your f500 targets, these are the CISOs you will turn to for continued growth.

Getting a “yes” from a Fortune 500 may sound like a dream for a startup—but it can quickly become a curse. Long contract negotiations, increased insurance requirements, premature scaling, and the need to support complex legacy environments can drain your team and resources. You’ll face challenges you weren’t prepared for and may alienate smaller customers who don’t relate to enterprise-scale use cases.

Contract Drafting and Negotiation for Entrepreneurs and Business Professionals

Mastering Effective Influencing Skills for Win-Win Outcomes – A practical guide

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services


May 05 2025

Security and resilience. Business continuity management systems. Requirements

Category: BCP,Cyber resiliencedisc7 @ 1:08 pm

1. Purpose and Scope:
The concept of business continuity in management systems focuses on preparing organizations to respond effectively to disruptions. Its primary goal is to ensure that essential business functions can continue during and after incidents such as cyberattacks, natural disasters, or system failures. Business continuity planning is an integral part of an organization’s broader risk management and security posture.

2. Integration with Management Systems:
Business continuity must be embedded into the overall management system, aligning with standards like ISO 22301. This integration ensures that continuity planning, implementation, and testing are not isolated activities but coordinated with information security, quality management, and operational strategies. It emphasizes a risk-based approach and continuous improvement.

3. Key Components:
A robust business continuity framework includes a business impact analysis (BIA), risk assessment, recovery strategies, and response plans. These elements help identify critical processes, assess vulnerabilities, and define acceptable downtime and recovery objectives. Regular training, awareness programs, and incident response drills support readiness and resilience.

4. Communication and Leadership Commitment:
Effective business continuity management depends on top-level commitment and clear communication channels. Leadership must allocate resources, define roles, and ensure all employees understand their responsibilities during a crisis. Internal and external communication strategies are also essential to maintain trust and manage stakeholder expectations.

5. Testing and Continuous Improvement:
To ensure resilience, organizations must regularly test and review their business continuity plans. Simulations, audits, and after-action reviews help identify gaps and improve preparedness. Lessons learned from real incidents or exercises should feed into an ongoing cycle of improvement, reinforcing the organization’s ability to adapt and recover quickly.

BS EN ISO 22301:2019+A1:2024 – TC

BS EN ISO 22301 is the international standard which specifies the requirements for a business continuity management system (BCMS). It helps you to identify potential threats to your business and build the capacity to deal with unforeseen events.

It enables an organization to have a more effective response and a quicker recovery, thereby reducing any impact on people, products and the organization’s bottom line.

What are the benefits of BS EN ISO 22301 – Business continuity management systems

BS EN ISO 22301 empowers organizations to put in place a business continuity management system. By implementing its principles and guidelines in your organization, your business can benefit from:

  • Reduced frequency and impact of disruptions
  • Ability to return to “business as usual” as swiftly as possible
  • Cost savings on reducing the impact of disruptions
  • Confidence that your plans are robust and ensures you are resilient and well-placed to deal with change
  • Increased stakeholder confidence and trust
  • Lower insurance premiums

Cyber Resilience – Defence-in-depth principles

Becoming Resilient – The Definitive Guide to ISO 22301 Implementation: The Plain English, Step-by-Step Handbook for Business Continuity Practitioners

ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS)

ISO 22301 Free to read

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: BCMS, ISO 22301


May 05 2025

The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

Category: AI,ISO 27kdisc7 @ 9:01 am

The Strategic Synergy: ISO 27001 and ISO 42001 – A New Era in Governance

After years of working closely with global management standards, it’s deeply inspiring to witness organizations adopting what I believe to be one of the most transformative alliances in modern governance: ISO 27001 and the newly introduced ISO 42001.

ISO 42001, developed for AI Management Systems, was intentionally designed to align with the well-established information security framework of ISO 27001. This alignment wasn’t incidental—it was a deliberate acknowledgment that responsible AI governance cannot exist without a strong foundation of information security.

Together, these two standards create a governance model that is not only comprehensive but essential for the future:

  • ISO 27001 fortifies the integrity, confidentiality, and availability of data—ensuring that information is secure and trusted.
  • ISO 42001 builds on that by governing how AI systems use this data—ensuring those systems operate in a transparent, ethical, and accountable manner.

This integration empowers organizations to:

  • Extend trust from data protection to decision-making processes.
  • Safeguard digital assets while promoting responsible AI outcomes.
  • Bridge security, compliance, and ethical innovation under one cohesive framework.

In a world increasingly shaped by AI, the combined application of ISO 27001 and ISO 42001 is not just a best practice—it’s a strategic imperative.

High-level summary of the ISO/IEC 42001 Readiness Checklist

1. Understand the Standard

  • Purchase and study ISO/IEC 42001 and related annexes.
  • Familiarize yourself with AI-specific risks, controls, and life cycle processes.
  • Review complementary ISO standards (e.g., ISO 22989, 31000, 38507).


2. Define AI Governance

  • Create and align AI policies with organizational goals.
  • Assign roles, responsibilities, and allocate resources for AI systems.
  • Establish procedures to assess AI impacts and manage their life cycles.
  • Ensure transparency and communication with stakeholders.


3. Conduct Risk Assessment

  • Identify potential risks: data, security, privacy, ethics, compliance, and reputation.
  • Use Annex C for AI-specific risk scenarios.


4. Develop Documentation and Policies

  • Ensure AI policies are relevant, aligned with broader org policies, and kept up to date.
  • Maintain accessible, centralized documentation.


5. Plan and Implement AIMS (AI Management System)

  • Conduct a gap analysis with input from all departments.
  • Create a step-by-step implementation plan.
  • Deliver training and build monitoring systems.


6. Internal Audit and Management Review

  • Conduct internal audits to evaluate readiness.
  • Use management reviews and feedback to drive improvements.
  • Track and resolve non-conformities.


7. Prepare for and Undergo External Audit

  • Select a certified and reputable audit partner.
  • Hold pre-audit meetings and simulations.
  • Designate a central point of contact for auditors.
  • Address audit findings with action plans.


8. Focus on Continuous Improvement

  • Establish a team to monitor post-certification compliance.
  • Regularly review and enhance the AIMS.
  • Avoid major system changes during initial implementation.

ISO/IEC 42001:2023, First Edition: Information technology – Artificial intelligence – Management system

ISO 42001 Artificial Intelligence Management Systems (AIMS) Implementation Guide: AIMS Framework | AI Security Standards

Businesses leveraging AI should prepare now for a future of increasing regulation.

DISC InfoSec’s earlier post on the AI topic

NIST: AI/ML Security Still Falls Short

Trust Me – ISO 42001 AI Management System

AI Management System Certification According to the ISO/IEC 42001 Standard

 Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional’s guide to AI attacks, threat modeling, and securing AI with MLSecOps

What You Are Not Told About ChatGPT: Key Insights into the Inner Workings of ChatGPT & How to Get the Most Out of It

Digital Ethics in the Age of AI – Navigating the ethical frontier today and beyond

Artificial intelligence – Ethical, social, and security impacts for the present and the future

“AI Regulation: Global Challenges and Opportunities”

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: AIMS, isms, iso 27001, ISO 42001


May 04 2025

ISO 27001’s Outdated SoA Rule: Time to Move On

Category: Information Security,ISO 27kdisc7 @ 11:54 am

  1. Current Requirement in ISO 27001
    ISO 27001 currently mandates that the SoA must include justifications for both the inclusion and exclusion of each Annex A control. This requirement is often interpreted to mean that organizations must provide individual reasoning for every control listed or omitted.
  2. Guidance from ISO 27005:2022
    ISO 27005:2022 clarifies that only controls identified through risk assessment and treatment planning should be included in the SoA. These controls are selected because they help reduce risk to acceptable levels. The guidance explicitly states that no further justification is necessary for their inclusion.
  3. Exclusion Justification Also Redundant
    By extension, the only valid reason for excluding a control is that it was not identified as necessary in the risk treatment plan. If a control does not mitigate any identified risk, there is no need for it to appear in the SoA, and thus, no detailed justification is required.
  4. Controls Must Be Risk-Driven
    Controls exist to manage or modify risks. Including or excluding them must be directly based on whether they are necessary for risk treatment. Requiring extra justification, separate from the risk assessment, is logically inconsistent with the function of controls within an ISMS.
  5. Recommendation to Remove the Justification Requirement
    Given this risk-based logic, the recommendation is to eliminate the need for detailed justifications of inclusions or exclusions in the SoA. This requirement appears to be an error or legacy clause in ISO 27001 that contradicts more recent guidance.
  6. Alignment with ISO 27005 and Future ISO 27003
    This position aligns with ISO 27005:2022, which supports a simplified, risk-driven approach to the SoA. It is anticipated that the upcoming ISO 27003 update will reinforce this same guidance, helping to resolve the inconsistency across standards.
  7. Practical Experience Supports the Change
    Despite popular belief, individualized justifications are not essential. The author has implemented many ISO 27001-certified ISMSs over the past decade without providing such justifications—and all achieved certification successfully.
  8. Simplified SOA Approach Recommended
    The SOA should only list necessary controls derived from the risk assessment, with no additional rationale needed for inclusion or exclusion. Controls not identified as necessary should simply not be listed, and the SOA should remain tightly aligned with the risk treatment plan.

Source: ISO27001 suggested change 13

ISO 27001 Compliance: Reduce Risks and Drive Business Value

ISO 27001:2022 Risk Management Steps


How to Continuously Enhance Your ISO 27001 ISMS (Clause 10 Explained)

Continual improvement doesn’t necessarily entail significant expenses. Many enhancements can be achieved through regular internal audits, management reviews, and staff engagement. By fostering a culture of continuous improvement, organizations can maintain an ISMS that effectively addresses current and emerging information security risks, ensuring resilience and compliance with ISO 27001 standards.

ISO 27001 Compliance and Certification

ISMS and ISO 27k training

Security Risk Assessment and ISO 27001 Gap Assessment

At DISC InfoSec, we streamline the entire process—guiding you confidently through complex frameworks such as ISO 27001, and SOC 2.

Here’s how we help:

  • Conduct gap assessments to identify compliance challenges and control maturity
  • Deliver straightforward, practical steps for remediation with assigned responsibility
  • Ensure ongoing guidance to support continued compliance with standard
  • Confirm your security posture through risk assessments and penetration testing

Let’s set up a quick call to explore how we can make your cybersecurity compliance process easier.

ISO 27001 certification validates that your ISMS meets recognized security standards and builds trust with customers by demonstrating a strong commitment to protecting information.

Feel free to get in touch if you have any questions about the ISO 27001 Internal audit or certification process.

Successfully completing your ISO 27001 audit confirms that your Information Security Management System (ISMS) meets the required standards and assures your customers of your commitment to security.

Get in touch with us to begin your ISO 27001 audit today.

ISO 27001:2022 Annex A Controls Explained

Preparing for an ISO Audit: Essential Tips and Best Practices for a Successful Outcome

Is a Risk Assessment required to justify the inclusion of Annex A controls in the Statement of Applicability?

Many companies perceive ISO 27001 as just another compliance expense?

ISO 27001: Guide & key Ingredients for Certification

DISC InfoSec Previous posts on ISO27k

ISO certification training courses.

ISMS and ISO 27k training

Difference Between Internal and External Audit

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: iso 27001, ISO 27001 2022, SoA, Statement of Applicability


May 04 2025

Enhance the fundamentals of securing the cloud

Category: Cloud computingdisc7 @ 11:21 am

🔐 Strengthen Your Account Security

  • Use Strong, Unique Passwords: Create complex passwords combining letters, numbers, and symbols. Avoid using easily guessable information like birthdays or common words.
  • Enable Two-Factor Authentication (2FA): Add an extra layer of security by requiring a verification code in addition to your password when logging in.
  • Regularly Update Passwords: Change your passwords periodically to minimize the risk of unauthorized access.


🛡️ Monitor and Manage Account Activity

  • Review Account Settings: Regularly check your profile information, email address, and connections for any unauthorized changes.
  • Monitor Login Activity: Keep an eye on your account’s login history to detect any suspicious access.
  • Be Cautious with Third-Party Applications: Only authorize trusted apps and periodically review and remove unnecessary or unused applications.


📧 Stay Vigilant Against Phishing and Scams

  • Recognize Phishing Attempts: Be wary of unsolicited messages or emails requesting sensitive information. Verify the sender’s identity before responding.
  • Educate Yourself on Common Scams: Stay informed about prevalent phishing tactics and how to avoid falling victim to them.
  • Report Suspicious Activity: If you encounter any dubious messages or profiles, report them to LinkedIn immediately.


🔒 Enhance Privacy and Data Protection

  • Adjust Privacy Settings: Control who can see your profile information and activity. Limit visibility to trusted connections.
  • Limit Personal Information: Avoid sharing sensitive details like your phone number or home address on your profile.
  • Be Mindful of Public Wi-Fi: Avoid accessing your LinkedIn account over unsecured networks. If necessary, use a VPN for added security.


📂 Prepare for Potential Account Compromise

  • Backup Your Data: Regularly export your LinkedIn data to have a copy in case of account issues.
  • Inform Your Network: If your account is compromised, notify your connections to prevent the spread of misinformation.
  • Seek Professional Assistance: In case of a security breach, contact support and, if necessary, law enforcement for assistance.


Implementing these measures can significantly reduce the risk of unauthorized access and protect your Information assets in the cloud.

“Cloud is a capability, not a destination!” (Hybrid cloud is an approach
pretty much settled on by all businesses.) the “data isn’t just in one place” mindset which has benefits that are applicable everywhere.

DISC InfoSec Guide the SaaS service to full ISO 27001 compliance and successful certification. Reach out for a free consultation.

Fundamentals of Cloud and Cloud Security 

The Self-Taught Cloud Computing Engineer: A comprehensive professional study guide to AWS, Azure, and GCP

Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: cloud security


May 02 2025

How to Create Your Own Home Lab for Hacking

Category: Hackingdisc7 @ 1:55 pm

Pawan Jaiswal’s guide, published on April 24, 2025, offers a comprehensive walkthrough for setting up a personal hacking lab. This resource is tailored for aspiring penetration testers, ethical hackers, and cybersecurity enthusiasts seeking hands-on experience in a controlled environment. The lab facilitates practical learning without risking real-world systems.

1. Purpose and Advantages of a Home Lab

Establishing a home lab provides a safe space to practice cybersecurity techniques. It allows learners to experiment with tools, understand vulnerabilities, and develop problem-solving skills. The lab serves as a sandbox for testing exploits, conducting scans, and simulating attacks without legal or ethical concerns.

2. Essential Hardware and Software Requirements

A robust setup is crucial for running multiple virtual machines (VMs). Recommended specifications include an Intel i5 or Ryzen 5 processor, a minimum of 8 GB RAM (16 GB preferred), and at least 512 GB SSD storage. For virtualization, tools like VirtualBox or VMware Workstation Player are suggested due to their user-friendliness and compatibility.

3. Configuring Virtual Machines

The lab setup involves creating an attacker machine and several victim machines:

  • Attacker Machine: Kali Linux is the preferred choice, equipped with tools like Nmap, Metasploit, and Wireshark.
  • Victim Machines: These include Metasploitable 2/3, DVWA (Damn Vulnerable Web App), OWASP Broken Web Apps, and Windows 10/11 VMs. These systems are intentionally vulnerable, providing realistic targets for practice.

4. Networking and Security Measures

Proper network configuration ensures isolation and safety:

  • Host-Only Networking: Prevents VMs from accessing the internet, mitigating the risk of unintended consequences.
  • Internal Networking: Allows communication between VMs for simulating attacks like DNS poisoning or man-in-the-middle scenarios.

Tools like tcpdump and Wireshark can be used to monitor and analyze network traffic within the lab.

5. Progressive Learning and Expansion

As skills develop, the lab can be expanded:

  • Additional Targets: Incorporate platforms like Juice Shop, bWAPP, or WebGoat for diverse challenges.
  • Capture The Flag (CTF) Challenges: Engage with VulnHub VMs or platforms like TryHackMe and Hack The Box to test and enhance skills.

6. Cloud-Based Alternatives

For those with hardware limitations, cloud-based labs offer viable alternatives:

  • TryHackMe: Beginner-friendly with guided paths.
  • Hack The Box: Offers a range of challenges from beginner to advanced levels.
  • RangeForce and PentesterLab: Provide browser-based labs focusing on various cybersecurity aspects.

These platforms eliminate the need for complex setups, allowing users to focus on learning.

In conclusion, setting up a home hacking lab is a valuable investment for anyone serious about a career in cybersecurity. It provides a practical environment to learn, experiment, and hone skills essential for real-world applications.

For further details, access the article here

Building and Automating Penetration Testing Labs in the Cloud: Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP

Hands-On AWS Penetration Testing with Kali Linux: Set-up a virtual lab and pentest major AWS services such as EC2, S3, Lambda, CloudFormation, and more

Building a Home Cybersecurity Lab

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services


May 02 2025

Car Hacking and its Countermeasures

Category: Hackingdisc7 @ 10:07 am

Car hacking refers to the unauthorized access and manipulation of a vehicle’s electronic systems, exploiting vulnerabilities in software, hardware, and communication networks. Modern vehicles, equipped with numerous Electronic Control Units (ECUs) interconnected via protocols like the Controller Area Network (CAN) bus, are susceptible to cyberattacks. These attacks can range from disabling brakes to remotely controlling the vehicle, as demonstrated in notable incidents like the 2015 Jeep Cherokee hack. The increasing integration of connected technologies, such as Bluetooth, Wi-Fi, and cellular networks, further expands the attack surface for potential hackers.

One prevalent method of car hacking involves exploiting keyless entry systems. Thieves use devices to intercept signals from key fobs, allowing unauthorized access and ignition of vehicles. Techniques like “relay attacks” and “headlight hacking” have been employed to bypass security measures, enabling criminals to steal cars in mere seconds. The rise in such incidents underscores the need for enhanced security protocols in vehicle design and manufacturing.

To counteract these threats, several measures can be implemented:

  1. Regular Software Updates: Manufacturers often release updates to patch known vulnerabilities. Vehicle owners should ensure their car’s software is up-to-date, either through dealership visits or over-the-air updates.
  2. Use of Physical Security Devices: Employing steering wheel locks or car alarms can deter potential thieves, adding an extra layer of protection against unauthorized access.
  3. Secure Key Fob Storage: Storing key fobs in signal-blocking containers, like Faraday pouches, can prevent signal interception and relay attacks.
  4. Intrusion Detection Systems (IDS): Implementing IDS within the vehicle’s network can monitor and detect anomalous activities, alerting owners to potential breaches.
  5. Network Segmentation and Gateways: Dividing the vehicle’s network into sub-networks with secure gateways can limit the spread of potential attacks, ensuring critical systems remain protected.
  6. Authentication Protocols: Incorporating robust authentication mechanisms can verify the legitimacy of commands and data within the vehicle’s systems, thwarting unauthorized access attempts.

The automotive industry must prioritize cybersecurity in the design and development of vehicles. Collaborative efforts between manufacturers, cybersecurity experts, and regulatory bodies are essential to establish standardized security protocols. As vehicles become increasingly connected and autonomous, proactive measures are vital to safeguard against evolving cyber threats.

In conclusion, while the advent of connected vehicles offers enhanced convenience and features, it also introduces significant cybersecurity challenges. By adopting a multi-faceted approach encompassing software updates, physical security measures, and advanced network protections, both manufacturers and consumers can work together to mitigate the risks associated with car hacking.

Hacking Connected Cars: Tactics, Techniques, and Procedures

The Car Hacker’s Handbook: A Guide for the Penetration Tester

Volvo Cars Suffered A New Data Breach? Data Published On Hacking Forum

Hacking Cars with MP3 Files

The Role of AI in Modern Hacking: Both an Asset and a Risk

Connected cars are heading toward a cybersecurity crisis

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Car Hacking, Car Security


May 01 2025

ISO 27001 Compliance: Reduce Risks and Drive Business Value

ISO 27001 is an internationally recognized standard for establishing an Information Security Management System (ISMS) that protects an organization’s information assets. The standard lays out a structured, systematic approach to information security: it explicitly defines requirements that cover people, processes, and technology, and it is built on a risk-based management process. In other words, ISO 27001 requires an organization to identify its critical data and assets, assess the risks to them, and implement controls to mitigate those risks. As the AuditBoard blog explains, ISO 27001 “provid[es] a systematic approach to managing sensitive company information, and ensuring its confidentiality, integrity, and availability,” and “employ[s] a risk-based management process”​. By achieving ISO 27001 certification, a company demonstrates its commitment to security best practices and gains “improved risk management” capabilities​. In practice, this means ISO 27001 embeds risk reduction into the company’s daily operations: the organization is continually considering where its vulnerabilities lie and how to address them. This alignment of policy and process with identified risks helps prevent incidents that could lead to breaches or financial losses (outcomes the blog warns are costly for non-compliant companies​).

A core principle of ISO 27001 is systematic risk assessment. The standard mandates that organizations catalog information assets and regularly evaluate threats and vulnerabilities to those assets. This formal risk assessment process – often codified as a risk register – forces management to confront what could go wrong, estimate the likelihood and impact of each threat, and then select controls to lower that risk. The AuditBoard article highlights that effective compliance “starts with a deep understanding of your organization’s unique risk profile” through “comprehensive risk assessments that identify, analyze, and prioritize potential security threats and vulnerabilities”​. By building this into the ISMS, ISO 27001 ensures that controls are not applied haphazardly but are directly tied to the organization’s actual threat landscape. In short, ISO 27001’s risk-based approach means the organization is proactively scanning for problems, rather than only reacting after a breach occurs. This systematic identification and treatment of risks measurably lowers the chance that a threat will go unnoticed and turn into a serious incident.

Another key principle of ISO 27001 is continual improvement of the security program. ISO 27001 is inherently iterative: it follows the Plan–Do–Check–Act cycle, which requires the organization to plan security controls, implement them, monitor and review their effectiveness, and act on the findings to improve. In practice, this means an ISO 27001–certified organization must regularly review and update its security policies and controls to keep pace with new threats. The AuditBoard blog emphasizes this proactive stance: it notes that maintaining compliance “encourages businesses to regularly review and update their security policies, practices, and systems,” allowing the organization to adapt to evolving threats and maintain “long-term resilience”​. Furthermore, ISO 27001 requires ongoing monitoring and measurement of the ISMS. Automated monitoring tools, for example, can detect anomalies or intrusions in real time. The blog underlines that such continuous monitoring “strengthens an organization’s security posture” by enabling a quick response to new risks​. By continuously detecting issues and feeding back lessons learned, an ISO 27001 ISMS avoids stagnation: it evolves as the threat landscape evolves. This dedication to continual assessment and enhancement means that security controls are always improving, which keeps residual risk as low as possible over time.

ISO 27001 also enforces organizational accountability for security. It requires that top management be directly involved in the ISMS: leaders must establish a clear security policy, assign roles and responsibilities, and ensure adequate resources are available for security. Every risk and control must have an owner. The AuditBoard article reinforces this by stressing the importance of a cross-functional security team and collaboration among IT, legal, HR, and business units​. In an ISO 27001 context, this means everyone from the CISO to line managers shares responsibility for protecting data. Accountability is further ensured through documentation: ISO 27001 demands thorough records of all security processes. The blog points out that maintaining “comprehensive records of risk assessments, security controls, training activities, and incident response efforts” provides clear evidence of compliance and highlights where improvements are needed​. This audit trail makes the organization’s security posture transparent to auditors and stakeholders. In effect, ISO 27001 turns vague good intentions into concrete, assigned tasks and documented procedures, so that it is always possible to trace who did what, and to hold the organization accountable for gaps or successes alike.

By combining these elements – structured risk analysis, continuous improvement, and built-in accountability – ISO 27001 compliance significantly reduces overall organizational risk. The AuditBoard blog summarizes the core idea of compliance in cybersecurity as a security framework that can withstand emerging threats, noting that adherence to standards “ensures that organizations protect their data and build trust by demonstrating their commitment to information security”​. In practical terms, this means a company with an ISO 27001 ISMS is far better equipped to prevent the “significant consequences” of non-compliance – such as data breaches, financial losses, and reputational damage​. By embedding a risk-based approach into daily routines and maintaining a culture of vigilance and responsibility, ISO 27001 helps an organization identify issues early and handle them before they become disasters. Ultimately, this strong, systematic compliance posture not only shields sensitive information, but also saves the company from costly incidents – improving its bottom line and competitive standing (as noted, certification can confer a competitive edge and “improved risk management”​). In summary, ISO 27001 reduces risk by making effective information security practices a formal, organization-wide process that is continuously managed and improved.

Source and full article here

ISO 27001:2022 Risk Management Steps


How to Continuously Enhance Your ISO 27001 ISMS (Clause 10 Explained)

Continual improvement doesn’t necessarily entail significant expenses. Many enhancements can be achieved through regular internal audits, management reviews, and staff engagement. By fostering a culture of continuous improvement, organizations can maintain an ISMS that effectively addresses current and emerging information security risks, ensuring resilience and compliance with ISO 27001 standards.

ISO 27001 Compliance and Certification

ISMS and ISO 27k training

Security Risk Assessment and ISO 27001 Gap Assessment

At DISC InfoSec, we streamline the entire process—guiding you confidently through complex frameworks such as ISO 27001, and SOC 2.

Here’s how we help:

  • Conduct gap assessments to identify compliance challenges and control maturity
  • Deliver straightforward, practical steps for remediation with assigned responsibility
  • Ensure ongoing guidance to support continued compliance with standard
  • Confirm your security posture through risk assessments and penetration testing

Let’s set up a quick call to explore how we can make your cybersecurity compliance process easier.

Feel free to get in touch if you have any questions about the ISO 27001 Internal audit or certification process.

Successfully completing your ISO 27001 audit confirms that your Information Security Management System (ISMS) meets the required standards and assures your customers of your commitment to security.

Get in touch with us to begin your ISO 27001 audit today.

ISO 27001:2022 Annex A Controls Explained

Preparing for an ISO Audit: Essential Tips and Best Practices for a Successful Outcome

Is a Risk Assessment required to justify the inclusion of Annex A controls in the Statement of Applicability?

Many companies perceive ISO 27001 as just another compliance expense?

ISO 27001: Guide & key Ingredients for Certification

DISC InfoSec Previous posts on ISO27k

ISO certification training courses.

ISMS and ISO 27k training

Difference Between Internal and External Audit

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Information Security Management System, iso 27001, iso 27002, ISO/IEC 27001


May 01 2025

How CISO’s are transforming the Third-Party Risk Management

​The RSA Conference Executive Security Action Forum (ESAF) report, How Top CISOs Are Transforming Third-Party Risk Management, presents insights from Fortune 1000 Chief Information Security Officers (CISOs) on evolving strategies to manage third-party cyber risks. The report underscores the inadequacy of traditional risk management approaches and highlights innovative practices adopted by leading organizations.​

1. Escalating Third-Party Risks

The report begins by emphasizing the increasing threat posed by third-party relationships. A survey revealed that 87% of Fortune 1000 companies experienced significant cyber incidents originating from third parties within a year. This statistic underscores the urgency for organizations to reassess their third-party risk management strategies.​

2. Limitations of Traditional Approaches

Traditional methods, such as self-assessment questionnaires and cybersecurity ratings, are criticized for their ineffectiveness. These approaches often lack context, fail to reduce actual risk, and do not foster resilience against cyber threats. The report advocates for a shift towards more proactive and context-aware strategies.​

3. Innovative Strategies by Leading CISOs

In response to these challenges, top CISOs are implementing bold new approaches. These include establishing prioritized security requirements, setting clear deadlines for control implementations, incorporating enforcement clauses in contracts, and assisting third parties in acquiring necessary security technologies and services. Such measures aim to enhance the overall security posture of both the organization and its partners.​

4. Emphasizing Business Leadership and Resilience

The report highlights the importance of involving business leaders in managing cyber risks. By integrating cybersecurity considerations into business decisions and fostering a culture of resilience, organizations can better prepare for and respond to third-party incidents. This holistic approach ensures that cybersecurity is not siloed but is a shared responsibility across the enterprise.​

5. Case Studies Demonstrating Effective Practices

Six cross-sector case studies are presented, showcasing how organizations in industries like defense, healthcare, insurance, manufacturing, and technology are successfully transforming their third-party risk management. These real-world examples provide valuable insights into the practical application of the recommended strategies and their positive outcomes.​

6. The Role of Technology and Security Vendors

The report calls upon technology and security vendors to play a pivotal role in minimizing complexities and reducing costs associated with third-party risk management. By collaborating with organizations, vendors can develop solutions that are more aligned with the evolving cybersecurity landscape and the specific needs of businesses.​

7. Industry Collaboration for Systemic Change

Recognizing that third-party risk is a widespread issue, the report advocates for industry-wide collaboration. Establishing common standards, sharing best practices, and engaging in joint initiatives can lead to systemic changes that enhance the security of the broader ecosystem. Such collective efforts are essential for addressing the complexities of modern cyber threats.​

8. Moving Forward with Proactive Measures

The ESAF report concludes by encouraging organizations to adopt proactive measures in managing third-party risks. By moving beyond traditional methods and embracing innovative, collaborative, and resilient strategies, businesses can better safeguard themselves against the evolving threat landscape. The insights provided serve as a roadmap for organizations aiming to strengthen their cybersecurity frameworks in partnership with their third parties.​

Sources and full article here

Cybersecurity and Third-Party Risk: Third Party Threat Hunting

Navigating Supply Chain Cyber Risk 

DISC InfoSec offer free initial high level assessment – Based on your needs DISC InfoSec offer ongoing compliance management or vCISO retainer.

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Third-party risk management


« Previous PageNext Page »