Julia Heron

Sort by:

How to develop an asset inventory for ISO 27001

When we talk about information assets we find that most people think about things like laptops and servers. But there are many other items you’ll need to consider. People, intellectual property and even intangible assets like your organisation’s brand can all fit into your Asset Inventory.

Keep reading >

4 Key Benefits of ISO 27001 Implementation

Compliance with ISO 27001 was previously about having a competitive edge, but as ISO 27001 certification becomes the norm for best-practice information security, it’s increasingly a minimum entry to a tender or contract renewal. Conformity to the standard can make the difference between winning and losing those all important tenders.

Keep reading >

We have been selected as one of the UK’s leading Cyber scaleups

Alliantist is delighted to announce it has been chosen as one of just 20 exclusive businesses from across the UK to be part of Tech Nation Cyber.  It is the UK’s first national cyber security growth programme.  Alumni for other Tech Nation programmes include many household brands.

Keep reading >

ISO 27001:2013 and ISO 27001:2017 what’s the difference?

In practical terms, very little has changed between the 2013 and 2017 ISO 27001 standards except for a few minor cosmetic points and a small name change.

Keep reading >

The NIST Cybersecurity Framework gets a reboot with Version 1.1

The NIST Cybersecurity Framework is the US standard regulated by the National Institute is Standards and Technology. The original version set out in February 2014 has now been updated to Version 1.1. Let’s take a look at what’s changed.

Keep reading >

The ISO 27001:2013 Internal Audit: Simplified

A question often asked by people that are new to information security is “how do I complete an internal audit of my ISMS?”. We thought it would be useful to share some of our guidance and ideas on how you can take a pragmatic business-led approach to achieve your goal.

Keep reading >

Women in cybersecurity, managing risk and the importance of communication: An interview with Jane Frankland

Drawn to the world of cybersecurity because of James Bond and a passion for change, the CISO advisor, entrepreneur, author and speaker, Jane Frankland talks to ISMS.online about all things security.

Keep reading >

How to conduct your ISO 27001 Management Review

The value of the information security management system (ISMS) Management Review is often under-estimated. Find out more here.

Keep reading >

ISMS.online Introduces Online Virtual Coach to cut ISO27001 Implementation Time and Costs

ISMS.Online announces the release of its ISO 27001:2013 Virtual Coach Programme to complement their groundbreaking software solution for implementing, managing and improving information security and data protection management. The cyber & information security market is growing fast and many new organisations are seeking to improve their security credentials in order to build stakeholder confidence and … Continued

Keep reading >

Bob means Business when it comes to information security by partnering with ISMS.online


Bob’s Business, the cyber security awareness company, and ISMS.online, the secure cloud delivered Information Security Management System (ISMS) service, announce they are working together.

Melanie Oldham, Director and Founder of Bob’s Business shared her thoughts behind the alliance.

Keep reading >