How to Conduct Gap Assessment in ISO 27001

Поділитися
Вставка
  • Опубліковано 30 вер 2024
  • In this comprehensive video, we break down how to conduct a gap assessment with a practical approach designed for professionals at any level. From understanding what a gap assessment is to learning the key steps involved, this video provides a step-by-step guide to help you perform gap assessments efficiently and effectively. We also cover how gap assessments work, the importance of evidence collection and verification, and how to create a gap analysis report. Towards the end, we explore the critical differences between a gap assessment and a risk assessment to ensure you're equipped with a clear understanding.
    What You’ll Learn:
    What is a gap assessment? A detailed explanation from scratch.
    How to perform a gap assessment in a practical, real-world setting.
    What evidence is needed for a gap assessment and how to verify it.
    How to create a gap analysis report that drives actionable insights.
    The thin line difference between gap assessment and risk assessment.
    Key Takeaways:
    Understand the purpose and process behind conducting a gap assessment.
    Learn how to verify evidence and use it to create a thorough gap analysis report.
    Know the difference between a gap assessment and a risk assessment, and why both are critical in business and cybersecurity contexts.
    End to End Approach of ISO 27001
    • ISO 27001:2022 Impleme...
    How to Do Scoping
    • Crafting the Ideal ISO...
    How to Write ISMS Context Document
    • How to Write Effective...
    #iso27001implementation #iso27001 #grc #infosecurity

КОМЕНТАРІ • 3

  • @matthewmcdonald9738
    @matthewmcdonald9738 День тому +1

    Very informative Prabh….thank you very much.Are you able to share this ISMS Gap assessment worksheet and Assessment Report ?

  • @Tracertme
    @Tracertme День тому

    I enjoyed the clarity and concise nature of each step process and the call out of logical sequence / dependencies. ❤ It provides focus for when self planning individual team scope aspects of cyber activities. Eg. EDR etc. policies, standard, controls which will map back to the augmented view provided by ISO27001. As a program manager it’s the documentation and transparent availability of logs /artefacts etc which are less diligently considered as deliverable requirements versus the implementation of the technology eg. Microsoft Intune.

  • @tm_manju
    @tm_manju День тому

    Hi Prabh, Is it worth reading the Book: "How To Think Like A Manager for the CISSP Exam" for CISSP Preparation?