{"id":3626,"date":"2019-05-02T07:52:44","date_gmt":"2019-05-02T07:52:44","guid":{"rendered":"http:\/\/localhost\/wordpress\/?page_id=3626"},"modified":"2019-11-15T07:08:56","modified_gmt":"2019-11-15T07:08:56","slug":"iso-27001","status":"publish","type":"page","link":"https:\/\/infogistic.com\/home\/iso-27001\/","title":{"rendered":"ISO 27001"},"content":{"rendered":"<div class=\"wp-block-image\"><figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"276\" height=\"200\" src=\"http:\/\/infogistic.com\/home\/wp-content\/uploads\/2019\/09\/consulting.jpg\" alt=\"\" class=\"wp-image-4431\"\/><\/figure><\/div><p class=\"ISO-p\"> ISO\/IEC 27001:2005 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organizations that claim to have adopted ISO\/IEC 27001 can therefore be formally audited and certified compliant with the standard.                                                                                                      <br>ISO 27001 ensures protecting critical and sensitive information using a holistic risk based approach while demonstrating credibility, trust, satisfaction and confidence with stakeholders, partners, citizens and customers.                                                                                   <br><b style=\"color:#207146;\">INFOGISTIC<\/b> has helped numerous organizations in implementing ISO 27001. Our consultants conduct the following activities during the ISO 27001 lifecycle.                                                              <\/p><ul class=\"ISO-ul wp-block-list\"><li> Gap analysis against ISO 270001<\/li><li>Process Documentation<\/li><li>Risk Assessment<\/li><li>Training on Developed Processes<\/li><li>Compliance Audit<\/li><li>Certification Facilitation<\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 27001:2005 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organizations that claim to have adopted ISO\/IEC 27001 can therefore be formally audited and certified compliant with the standard. ISO 27001 ensures protecting critical and sensitive information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3626","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/comments?post=3626"}],"version-history":[{"count":2,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3626\/revisions"}],"predecessor-version":[{"id":4680,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3626\/revisions\/4680"}],"wp:attachment":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/media?parent=3626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}