We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.
We go through the Cyberday concept and the fundamentals of systematic information security management.
We deal with determining the means of managing information security through information security risk management, as well as creating and sharing a Statement of Applicability (SoA).
We deal with personnel training, guidance and the automation of all this as part of the information security management system.
We deal with the credible running of your own digital security management system, continuous development and supervision related to digital security work.