Skip to content

Achieve Robust Information Security with ISO 27001:2022

Our platform empowers your organisation to align with ISO 27001, ensuring comprehensive security management. This international standard is essential for protecting sensitive data and enhancing resilience against cyber threats. With over 70,000 certificates issued globally, ISO 27001’s widespread adoption underscores its importance in safeguarding information assets.

Why ISO 27001 Matters

Achieving ISO 27001:2022 certification emphasises a comprehensive, risk-based approach to improving information security management, ensuring your organisation effectively manages and mitigates potential threats, aligning with modern security needs. It provides a systematic methodology for managing sensitive information, ensuring it remains secure. Certification can reduce data breach costs by 30% and is recognised in over 150 countries, enhancing international business opportunities and competitive advantage.

How ISO 27001 Certification Benefits Your Business

  1. Achieve Cost Efficiency: Save time and money by preventing costly security breaches. Implement proactive risk management measures to significantly reduce the likelihood of incidents.
  2. Accelerate Sales Growth: Streamline your sales process by reducing extensive security documentation requests (RFIs). Showcase your compliance with international information security standards to shorten negotiation times and close deals faster.
  3. Boost Client Trust: Demonstrate your commitment to information security to enhance client confidence and build lasting trust. Increase customer loyalty and retain clients in sectors like finance, healthcare, and IT services.

 

Comprehensive Guide on How to Implement ISO 27001:2022 Certification

The standard’s structure includes a comprehensive Information Security Management System (ISMS) framework and a detailed ISO 27001 implementation guide that integrates risk management processes and Annex A controls. These components create a holistic security strategy, addressing various aspects of security (ISO 27001:2022 Clause 4.2). This approach not only enhances security but also fosters a culture of awareness and compliance within the organisation.

Streamlining Certification with ISMS.online

ISMS.online plays a crucial role in facilitating alignment by offering tools that streamline the certification process. Our platform provides automated risk assessments and real-time monitoring, simplifying the implementation of ISO 27001:2022 requirements. This not only reduces manual effort but also enhances efficiency and accuracy in maintaining alignment.

Join 25000 + Users Achieving ISO 27001 with ISMS.online. Book Your Free Demo Today!


Understanding ISO 27001:2022

ISO 27001 is a pivotal standard for improving an Information Security Management System (ISMS), offering a structured framework to protect sensitive data. This framework integrates comprehensive risk evaluation processes and Annex A controls, forming a robust security strategy. Organisations can effectively identify, analyse, and address vulnerabilities, enhancing their overall security posture.

Key Elements of ISO 27001:2022

  • ISMS Framework: This foundational component establishes systematic policies and procedures for managing information security (ISO 27001:2022 Clause 4.2). It aligns organisational goals with security protocols, fostering a culture of compliance and awareness.
  • Risk Evaluation: Central to ISO 27001, this process involves conducting thorough assessments to identify potential threats. It is essential for implementing appropriate security measures and ensuring continuous monitoring and improvement.
  • ISO 27001 Controls: ISO 27001:2022 outlines a comprehensive set of ISO 27001 controls within Annex A, designed to address various aspects of information security. These controls include measures for access control, cryptography, physical security, and incident management, among others. Implementing these controls ensures your Information Security Management System (ISMS) effectively mitigates risks and safeguards sensitive information.

iso 27001 requirements and structure

Aligning with International Standards

ISO 27001:2022 is developed in collaboration with the International Electrotechnical Commission (IEC), ensuring that the standard aligns with global best practices in information security. This partnership enhances the credibility and applicability of ISO 27001 across diverse industries and regions.

How ISO 27001 Integrates with Other Standards

ISO 27001:2022 seamlessly integrates with other standards like ISO 9001 for quality management, ISO 27002 for code of practice for information security controls and regulations like GDPR, enhancing compliance and operational efficiency. This integration allows organisations to streamline regulatory efforts and align security practices with broader business objectives. Initial preparation involves a gap analysis to identify areas needing improvement, followed by a risk evaluation to assess potential threats. Implementing Annex A controls ensures comprehensive security measures are in place. The final audit process, including Stage 1 and Stage 2 audits, verifies compliance and readiness for certification.

Why Is ISO 27001:2022 Important for Organisations?

ISO 27001 plays a vital role in strengthening your organisation’s data protection strategies. It provides a comprehensive framework for managing sensitive information, aligning with contemporary cybersecurity requirements through a risk-based approach. This alignment not only fortifies defences but also ensures adherence to regulations like GDPR, mitigating potential legal risks (ISO 27001:2022 Clause 6.1).

ISO 27001:2022 Integration with Other Standards

ISO 27001 is part of the broader ISO family of management system standards. This allows it to be seamlessly integrated with other standards, such as:

This integrated approach helps your organisation maintain robust operational standards, streamlining the certification process and enhancing compliance.

How Does ISO 27001:2022 Enhance Risk Management?

  • Structured Risk Management: The standard emphasises the systematic identification, assessment, and mitigation of risks, fostering a proactive security posture.
  • Incident Reduction: Organisations experience fewer breaches due to the robust controls outlined in Annex A.
  • Operational Efficiency: Streamlined processes enhance efficiency, reducing the likelihood of costly incidents.

Structured Risk Management with ISO 27001:2022

ISO 27001 requires organisations to adopt a comprehensive, systematic approach to risk management. This includes:

  • Risk Identification and Assessment: Identify potential threats to sensitive data and evaluate the severity and likelihood of those risks (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Select appropriate treatment options, such as mitigating, transferring, avoiding, or accepting risks. With the addition of new options like exploiting and enhancing, organisations can take calculated risks to harness opportunities.

Each of these steps must be reviewed regularly to ensure that the risk landscape is continuously monitored and mitigated as necessary.

 

What Are the Benefits for Trust and Reputation?

Certification signifies a commitment to data protection, enhancing your business reputation and customer trust. Certified organisations often see a 20% increase in customer satisfaction, as clients appreciate the assurance of secure data handling.

How ISO 27001 Certification Impacts Client Trust and Sales

  1. Increased Client Confidence: When prospective clients see that your organisation is ISO 27001 certified, it automatically elevates their trust in your ability to protect sensitive information. This trust is essential for sectors where data security is a deciding factor, such as healthcare, finance, and government contracting.
  2. Faster Sales Cycles: ISO 27001 certification reduces the time spent answering security questionnaires during the procurement process. Prospective clients will see your certification as a guarantee of high security standards, speeding up decision-making.
  3. Competitive Advantage: ISO 27001 certification positions your company as a leader in information security, giving you an edge over competitors who may not hold this certification.

How Does ISO 27001:2022 Offer Competitive Advantages?

ISO 27001 opens international business opportunities, recognised in over 150 countries. It cultivates a culture of security awareness, positively influencing organisational culture and encouraging continuous improvement and resilience, essential for thriving in today’s digital environment.

How Can ISO 27001 Support Regulatory Adherence?

Aligning with ISO 27001 helps navigate complex regulatory landscapes, ensuring adherence to various legal requirements. This alignment reduces potential legal liabilities and enhances overall governance.

Incorporating ISO 27001:2022 into your organisation not only strengthens your data protection framework but also builds a foundation for sustainable growth and trust in the global market.


Enhancing Risk Management with ISO 27001:2022

ISO 27001:2022 offers a robust framework for managing information security risks, vital for safeguarding your organisation’s sensitive data. This standard emphasises a systematic approach to risk evaluation, ensuring potential threats are identified, assessed, and mitigated effectively.

How Does ISO 27001 Structure Risk Management?

ISO 27001:2022 integrates risk evaluation into the Information Security Management System (ISMS), involving:

  • Risk Assessment: Conducting thorough evaluations to identify and analyse potential threats and vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Implementing strategies to mitigate identified risks, using controls outlined in Annex A to reduce vulnerabilities and threats.
  • Continuous Monitoring: Regularly reviewing and updating practices to adapt to evolving threats and maintain security effectiveness.

What Techniques and Strategies Are Key?

Effective risk management under ISO 27001:2022 involves:

  • Risk Assessment and Analysis: Utilising methodologies like SWOT analysis and threat modelling to evaluate risks comprehensively.
  • Risk Treatment and Mitigation: Applying controls from Annex A to address specific risks, ensuring a proactive approach to security.
  • Continuous Improvement: Fostering a security-focused culture that encourages ongoing evaluation and enhancement of risk management practices.

 

How Can the Framework Be Tailored to Your Organisation?

ISO 27001:2022’s framework can be customised to fit your organisation’s specific needs, ensuring that security measures align with business objectives and regulatory requirements. By fostering a culture of proactive risk management, organisations with ISO 27001 certification experience fewer security breaches and enhanced resilience against cyber threats. This approach not only protects your data but also builds trust with stakeholders, enhancing your organisation’s reputation and competitive edge.

Key Changes in ISO 27001:2022

ISO 27001:2022 introduces pivotal updates, enhancing its role in modern cybersecurity. The most significant changes reside in Annex A, which now includes advanced measures for digital security and proactive threat management. These revisions address the evolving nature of security challenges, particularly the increasing reliance on digital platforms.

Key Differences Between ISO 27001:2022 and Earlier Versions

The differences between the 2013 and 2022 versions of ISO 27001 are crucial to understanding the updated standard. While there are no massive overhauls, the refinements in Annex A controls and other areas ensure the standard remains relevant to modern cybersecurity challenges. Key changes include:

  • Restructuring of Annex A Controls: Annex A controls have been condensed from 114 to 93, with some being merged, revised, or newly added. These changes reflect the current cybersecurity environment, making controls more streamlined and focused.
  • New Focus Areas: The 11 new controls introduced in ISO 27001:2022 include areas such as threat intelligence, physical security monitoring, secure coding, and cloud service security, addressing the rise of digital threats and the increased reliance on cloud-based solutions.

Understanding Annex A Controls

  • Enhanced Security Protocols: Annex A now features 93 controls, with new additions focusing on digital security and proactive threat management. These controls are designed to mitigate emerging risks and ensure robust protection of information assets.
  • Digital Security Focus: As digital platforms become integral to operations, ISO 27001:2022 emphasises securing digital environments, ensuring data integrity, and safeguarding against unauthorised access.
  • Proactive Threat Management: New controls enable organisations to anticipate and respond to potential security incidents more effectively, strengthening their overall security posture.

Detailed Breakdown of Annex A Controls in ISO 27001:2022

ISO 27001:2022 introduces a revised set of Annex A controls, reducing the total from 114 to 93 and restructuring them into four main groups. Here’s a breakdown of the control categories:

Control Group Number of Controls Examples
Organisational 37 Threat intelligence, ICT readiness, information security policies
People 8 Responsibilities for security, screening
Physical 14 Physical security monitoring, equipment protection
Technological 34 Web filtering, secure coding, data leakage prevention

New Controls
ISO 27001:2022 introduces 11 new controls focused on emerging technologies and challenges, including:

  • Cloud services: Security measures for cloud infrastructure.
  • Threat intelligence: Proactive identification of security threats.
  • ICT readiness: Business continuity preparations for ICT systems.

By implementing these controls, organisations ensure they are equipped to handle modern information security challenges.

iso 27002 new controls

Full Table of ISO 27001 Controls

Below is a full list of ISO 27001:2022 controls

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

Navigating Implementation Challenges

Organisations may face challenges such as resource constraints and insufficient management support when implementing these updates. Effective resource allocation and stakeholder engagement are crucial for maintaining momentum and achieving successful compliance. Regular training sessions can help clarify the standard’s requirements, reducing compliance challenges.

Adapting to Evolving Security Threats

These updates demonstrate ISO 27001:2022’s adaptability to the changing security environment, ensuring organisations remain resilient against new threats. By aligning with these enhanced requirements, your organisation can bolster its security framework, improve compliance processes, and maintain a competitive edge in the global market.


How Can Organisations Successfully Attain ISO 27001 Certification?

Achieving ISO 27001:2022 requires a methodical approach, ensuring your organisation aligns with the standard’s comprehensive requirements. Here’s a detailed guide to navigate this process effectively:

Kickstart Your Certification with a Thorough Gap Analysis

Identify improvement areas with a comprehensive gap analysis. Assess current practices against ISO 27001 standard to pinpoint discrepancies. Develop a detailed project plan outlining objectives, timelines, and responsibilities. Engage stakeholders early to secure buy-in and allocate resources efficiently.

Implement an Effective ISMS

Establish and implement an Information Security Management System (ISMS) tailored to your organisational goals. Implement the 93 Annex A controls, emphasising risk assessment and treatment (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and enhancing precision.

Perform Regular Internal Audits

Conduct regular internal audits to evaluate the effectiveness of your ISMS. Management reviews are essential for performance evaluation and necessary adjustments (ISO 27001:2022 Clause 9.3). ISMS.online facilitates real-time collaboration, boosting team efficiency and audit readiness.

Engage with Certification Bodies

Select an accredited certification body and schedule the audit process, including Stage 1 and Stage 2 audits. Ensure all documentation is complete and accessible. ISMS.online offers templates and resources to simplify documentation and track progress.

Overcome Common Challenges with a Free Consultation

Overcome resource constraints and resistance to change by fostering a culture of security awareness and continuous improvement. Our platform supports maintaining alignment over time, aiding your organisation in achieving and sustaining certification.

Schedule a free consultation to address resource constraints and navigate resistance to change. Learn how ISMS.online can support your implementation efforts and ensure successful certification.

ISO 27001:2022 and Supplier Relationships Requirements

ISO 27001:2022 has introduced new requirements to ensure organisations maintain robust supplier and third-party management programs. This includes:

  • Identifying and Assessing Suppliers: Organisations must identify and analyse third-party suppliers that impact information security. A thorough risk assessment for each supplier is mandatory to ensure compliance with your ISMS.
  • Supplier Security Controls: Ensure that your suppliers implement adequate security controls and that these are regularly reviewed. This extends to ensuring that customer service levels and personal data protection are not adversely affected.
  • Auditing Suppliers: Organisations should audit their suppliers’ processes and systems regularly. This aligns with the new ISO 27001:2022 requirements, ensuring that supplier compliance is maintained and that risks from third-party partnerships are mitigated.

 

Enhanced Employee Cybersecurity Awareness

ISO 27001:2022 continues to emphasise the importance of employee awareness. Implementing policies for ongoing education and training is critical. This approach ensures that your employees are not only aware of security risks but are also capable of actively participating in mitigating those risks.

  • Human Error Prevention: Businesses should invest in training programs that aim to prevent human error, one of the leading causes of security breaches.
  • Clear Policy Development: Establish clear guidelines for employee conduct regarding data security. This includes awareness programs on phishing, password management, and mobile device security.
  • Security Culture: Foster a security-aware culture where employees feel empowered to raise concerns about cybersecurity threats. An environment of openness helps organisations tackle risks before they materialise into incidents.

ISO 27001:2022 Requirements for Human Resource Security

One of the essential refinements in ISO 27001:2022 is its expanded focus on human resource security. This involves:

  • Personnel Screening: Clear guidelines for personnel screening before hiring are crucial to ensuring that employees with access to sensitive information meet required security standards.
  • Training and Awareness: Ongoing education is required to ensure that staff are fully aware of the organisation’s security policies and procedures.
  • Disciplinary Actions: Define clear consequences for policy violations, ensuring that all employees understand the importance of complying with security requirements.

These controls ensure that organisations manage both internal and external personnel security risks effectively.


Employee Awareness Programs and Security Culture

Fostering a culture of security awareness is crucial for maintaining strong defences against evolving cyber threats. ISO 27001:2022 promotes ongoing training and awareness programs to ensure that all employees, from leadership to staff, are involved in upholding information security standards.

  • Phishing Simulations and Security Drills: Conducting regular security drills and phishing simulations helps ensure employees are prepared to handle cyber incidents.
  • Interactive Workshops: Engage employees in practical training sessions that reinforce key security protocols, improving overall organisational awareness.

Continual Improvement and Cybersecurity Culture

Finally, ISO 27001:2022 advocates for a culture of continual improvement, where organisations consistently evaluate and update their security policies. This proactive stance is integral to maintaining compliance and ensuring the organisation stays ahead of emerging threats.

  • Security Governance: Regular updates to security policies and audits of cybersecurity practices ensure ongoing compliance with ISO 27001:2022.
  • Proactive Risk Management: Encouraging a culture that prioritises risk assessment and mitigation allows organisations to stay responsive to new cyber threats.

Optimal Timing for ISO 27001 Adoption

Adopting ISO 27001:2022 is a strategic decision that depends on your organisation’s readiness and objectives. The ideal timing often aligns with periods of growth or digital transformation, where enhancing security frameworks can significantly improve business outcomes. Early adoption provides a competitive edge, as certification is recognised in over 150 countries, expanding international business opportunities.

Conducting a Readiness Assessment

To ensure a seamless adoption, conduct a thorough readiness assessment to evaluate current security practices against the updated standard. This involves:

  • Gap Analysis: Identify areas needing improvement and align them with ISO 27001:2022 requirements.
  • Resource Allocation: Ensure adequate resources, including personnel, technology, and budget, are available to support the adoption.
  • Stakeholder Engagement: Secure buy-in from key stakeholders to facilitate a smooth adoption process.

Aligning Certification with Strategic Goals

Aligning certification with strategic goals enhances business outcomes. Consider:

  • Timeline and Deadlines: Be aware of industry-specific deadlines for compliance to avoid penalties.
  • Continuous Improvement: Foster a culture of ongoing evaluation and enhancement of security practices.

 

Utilising ISMS.online for Effective Management

Our platform, ISMS.online, plays a vital role in managing the adoption effectively. It offers tools for automating compliance tasks, reducing manual effort, and providing real-time collaboration features. This ensures your organisation can maintain compliance and track progress efficiently throughout the adoption process.

By strategically planning and utilising the right tools, your organisation can navigate the adoption of ISO 27001:2022 smoothly, ensuring robust security and compliance.

Where Does ISO 27001:2022 Align with Other Regulatory Standards?

ISO 27001 plays a significant role in aligning with key regulatory frameworks, such as GDPR and NIS 2, to enhance data protection and streamline regulatory adherence. This alignment not only strengthens data privacy but also improves organisational resilience across multiple frameworks.

How Does ISO 27001:2022 Enhance GDPR Compliance?

ISO 27001:2022 complements GDPR by focusing on data protection and privacy through its comprehensive risk management processes (ISO 27001:2022 Clause 6.1). The standard’s emphasis on safeguarding personal data aligns with GDPR’s stringent requirements, ensuring robust data protection strategies.

What Role Does ISO 27001:2022 Play in Supporting NIS 2 Directives?

The standard supports NIS 2 directives by enhancing cybersecurity resilience. ISO 27001:2022’s focus on threat intelligence and incident response aligns with NIS 2’s objectives, fortifying organisations against cyber threats and ensuring continuity of critical services.

How Does ISO 27001:2022 Integrate with Other ISO Standards?

ISO 27001 integrates effectively with other ISO standards, such as ISO 9001 and ISO 14001, creating synergies that enhance overall regulatory alignment and operational efficiency. This integration facilitates a unified approach to managing quality, environmental, and security standards within an organisation.

How Can Organisations Achieve Comprehensive Regulatory Alignment with ISO 27001:2022?

Organisations can achieve comprehensive regulatory alignment by synchronising their security practices with broader requirements. Our platform, ISMS.online, offers extensive certification support, providing tools and resources to simplify the process. Industry associations and webinars further enhance understanding and implementation, ensuring organisations remain compliant and competitive.

Can ISO 27001:2022 Effectively Mitigate New Security Challenges?

Emerging threats, including cyber-attacks and data breaches, necessitate robust strategies. ISO 27001:2022 offers a comprehensive framework for managing risks, emphasising a risk-based approach to identify, assess, and mitigate potential threats.

How Does ISO 27001:2022 Enhance Cyber Threat Mitigation?

ISO 27001:2022 strengthens mitigation through structured risk management processes. By implementing Annex A controls, organisations can proactively address vulnerabilities, reducing cyber incidents. This proactive stance builds trust with clients and partners, differentiating businesses in the market.

What Measures Ensure Cloud Security with ISO 27001:2022?

Cloud security challenges are prevalent as organisations migrate to digital platforms. ISO 27001:2022 includes specific controls for cloud environments, ensuring data integrity and safeguarding against unauthorised access. These measures foster customer loyalty and enhance market share.

How Does ISO 27001:2022 Prevent Data Breaches?

Data breaches pose significant risks, impacting reputation and financial stability. ISO 27001:2022 establishes comprehensive protocols, ensuring continuous monitoring and improvement. Certified organisations often experience fewer breaches, maintaining effective security measures.

How Can Organisations Adapt to Evolving Threat Landscapes?

Organisations can adapt ISO 27001:2022 to evolving threats by regularly updating security practices. This adaptability ensures alignment with emerging threats, maintaining robust defences. By demonstrating a commitment to security, certified organisations gain a competitive edge and are preferred by clients and partners.

Cultivating a Security Culture with ISO 27001 Compliance

ISO 27001 serves as a cornerstone in developing a robust security culture by emphasising awareness and comprehensive training. This approach not only fortifies your organisation’s security posture but also aligns with current cybersecurity standards.

How to Enhance Security Awareness and Training

Security awareness is integral to ISO 27001:2022, ensuring your employees understand their roles in protecting information assets. Tailored training programmes empower staff to recognise and respond to threats effectively, minimising incident risks.

What Are Effective Training Strategies?

Organisations can enhance training by:

  • Interactive Workshops: Conduct engaging sessions that reinforce security protocols.
  • E-Learning Modules: Provide flexible online courses for continuous learning.
  • Simulated Exercises: Implement phishing simulations and incident response drills to test readiness.

 

How Does Leadership Influence Security Culture?

Leadership plays a pivotal role in embedding a security-focused culture. By prioritising security initiatives and leading by example, management instils responsibility and vigilance throughout the organisation, making security integral to the organisational ethos.

What Are the Long-Term Benefits of Security Awareness?

ISO 27001:2022 offers sustained improvements and risk reduction, enhancing credibility and providing a competitive edge. Organisations report increased operational efficiency and reduced costs, supporting growth and opening new opportunities.

How Does ISMS.online Support Your Security Culture?

Our platform, ISMS.online, aids organisations by offering tools for tracking training progress and facilitating real-time collaboration. This ensures that security awareness is maintained and continuously improved, aligning with ISO 27001:2022’s objectives.


Navigating Challenges in ISO 27001:2022 Implementation

Implementing ISO 27001:2022 involves overcoming significant challenges, such as managing limited resources and addressing resistance to change. These hurdles must be addressed to achieve certification and enhance your organisation’s information security posture.

Identifying Common Implementation Hurdles

Organisations often face difficulties in allocating adequate resources, both financial and human, to meet ISO 27001:2022’s comprehensive requirements. Resistance to adopting new security practices can also impede progress, as employees may be hesitant to alter established workflows.

Efficient Resource Management Strategies

To optimise resource management, prioritise tasks based on risk assessment outcomes, focusing on high-impact areas (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and ensuring critical areas receive the necessary attention.

Overcoming Resistance to Change

Effective communication and training are key to mitigating resistance. Engage employees in the implementation process by highlighting the benefits of ISO 27001:2022, such as enhanced data protection and GDPR alignment. Regular training sessions can foster a culture of security awareness and compliance.

Enhancing Implementation with ISMS.online

ISMS.online plays a pivotal role in overcoming these challenges by providing tools that enhance collaboration and streamline documentation. Our platform supports integrated compliance strategies, aligning ISO 27001 with standards like ISO 9001, thereby improving overall efficiency and regulatory adherence. By simplifying the implementation process, ISMS.online helps your organisation achieve and maintain ISO 27001:2022 certification effectively.

What are the key differences between ISO 27001:2022 and earlier versions?

ISO 27001:2022 introduces pivotal updates to meet evolving security demands, enhancing its relevance in today’s digital environment. A significant change is the expansion of Annex A controls, now totaling 93, which include new measures for cloud security and threat intelligence. These additions underscore the growing importance of digital ecosystems and proactive threat management.

Impact on Compliance and Certification
The updates in ISO 27001:2022 require adjustments in compliance processes. Your organisation must integrate these new controls into its Information Security Management Systems (ISMS), ensuring alignment with the latest requirements (ISO 27001:2022 Clause 6.1). This integration streamlines certification by providing a comprehensive framework for managing information risks.

New Controls and Their Significance
The introduction of controls focused on cloud security and threat intelligence is noteworthy. These controls help your organisation protect data in complex digital environments, addressing vulnerabilities unique to cloud systems. By implementing these measures, you can enhance your security posture and reduce the risk of data breaches.

Adapting to New Requirements
To adapt to these changes, your organisation should conduct a thorough gap analysis to identify areas needing improvement. This involves assessing current practices against the updated standard, ensuring alignment with new controls. By using platforms like ISMS.online, you can automate compliance tasks, reducing manual effort and enhancing efficiency.

These updates highlight ISO 27001:2022’s commitment to addressing contemporary security challenges, ensuring your organisation remains resilient against emerging threats.

Why should Compliance Officers prioritise ISO 27001:2022?

ISO 27001:2022 is pivotal for compliance officers seeking to enhance their organisation’s information security framework. Its structured methodology for regulatory adherence and risk management is indispensable in today’s interconnected environment.

Navigating Regulatory Frameworks
ISO 27001:2022 aligns with global standards like GDPR, providing a comprehensive framework that ensures data protection and privacy. By adhering to its guidelines, you can confidently navigate complex regulatory landscapes, reducing legal risks and enhancing governance (ISO 27001:2022 Clause 6.1).

Proactive Risk Management
The standard’s risk-based approach enables organisations to systematically identify, assess, and mitigate risks. This proactive stance minimises vulnerabilities and fosters a culture of continuous improvement, essential for maintaining a robust security posture. Compliance officers can utilise ISO 27001:2022 to implement effective risk treatment strategies, ensuring resilience against emerging threats.

Enhancing Organisational Security
ISO 27001:2022 significantly enhances your organisation’s security posture by embedding security practices into core business processes. This integration boosts operational efficiency and builds trust with stakeholders, positioning your organisation as a leader in information security.

Effective Implementation Strategies
Compliance officers can implement ISO 27001:2022 effectively by utilising platforms like ISMS.online, which streamline efforts through automated risk assessments and real-time monitoring. Engaging stakeholders and fostering a security-aware culture are crucial steps in embedding the standard’s principles across your organisation.

By prioritising ISO 27001:2022, you not only safeguard your organisation’s data but also drive strategic advantages in a competitive market.

How does ISO 27001:2022 enhance security frameworks?

ISO 27001:2022 establishes a comprehensive framework for managing information security, focusing on a risk-based approach. This approach allows your organisation to systematically identify, assess, and address potential threats, ensuring robust protection of sensitive data and adherence to international standards.

Key Strategies for Threat Mitigation

  • Conducting Risk Assessments: Thorough evaluations identify vulnerabilities and potential threats (ISO 27001:2022 Clause 6.1), forming the basis for targeted security measures.
  • Implementing Security Controls: Annex A controls are utilised to address specific risks, ensuring a holistic approach to threat prevention.
  • Continuous Monitoring: Regular reviews of security practices allow adaptation to evolving threats, maintaining the effectiveness of your security posture.

Data Protection and Privacy Alignment
ISO 27001:2022 integrates security practices into organisational processes, aligning with regulations like GDPR. This ensures that personal data is handled securely, reducing legal risks and enhancing stakeholder trust.

Building a Proactive Security Culture
By fostering security awareness, ISO 27001:2022 promotes continuous improvement and vigilance. This proactive stance minimises vulnerabilities and strengthens your organisation’s overall security posture. Our platform, ISMS.online, supports these efforts with tools for real-time monitoring and automated risk assessments, positioning your organisation as a leader in information security.

Incorporating ISO 27001:2022 into your security strategy not only fortifies defences but also enhances your organisation’s reputation and competitive advantage.

What advantages does ISO 27001:2022 offer to CEOs?

ISO 27001:2022 is a strategic asset for CEOs, enhancing organisational resilience and operational efficiency through a risk-based methodology. This standard aligns security protocols with business objectives, ensuring robust information security management.

How does ISO 27001:2022 enhance strategic business integration?

Risk Management Framework:
ISO 27001:2022 provides a comprehensive framework for identifying and mitigating risks, safeguarding your assets, and ensuring business continuity.

Regulatory Compliance Standards:
By aligning with global standards like GDPR, it minimises legal risks and strengthens governance, essential for maintaining market trust.

What are the competitive advantages of ISO 27001:2022?

Reputation Enhancement:
Certification demonstrates a commitment to security, boosting customer trust and satisfaction. Organisations often report increased client confidence, leading to higher retention rates.

Global Market Access:
With acceptance in over 150 countries, ISO 27001:2022 facilitates entry into international markets, offering a competitive edge.

How can ISO 27001:2022 drive business growth?

Operational Efficiency:
Streamlined processes reduce security incidents, lowering costs and improving efficiency.

Innovation and Digital Transformation:
By fostering a culture of security awareness, it supports digital transformation and innovation, driving business growth.

Integrating ISO 27001:2022 into your strategic planning aligns security measures with organisational goals, ensuring they support broader business objectives. Our platform, ISMS.online, simplifies compliance, offering tools for real-time monitoring and risk management, ensuring your organisation remains secure and competitive.

How to facilitate digital transformation with ISO 27001:2022

ISO 27001:2022 provides a comprehensive framework for organisations transitioning to digital platforms, ensuring data protection and adherence to international standards. This standard is pivotal in managing digital risks and enhancing security measures.

How to Manage Digital Risks Effectively
ISO 27001:2022 offers a risk-based approach to identify and mitigate vulnerabilities. By conducting thorough risk assessments and implementing Annex A controls, your organisation can proactively address potential threats and maintain robust security measures. This approach aligns with evolving cybersecurity requirements, ensuring your digital assets are safeguarded.

How to Foster Secure Digital Innovation
Integrating ISO 27001:2022 into your development lifecycle ensures security is prioritised from design to deployment. This reduces breach risks and enhances data protection, allowing your organisation to pursue innovation confidently while maintaining compliance.

How to Build a Culture of Digital Security
Promoting a culture of security involves emphasising awareness and training. Implement comprehensive programmes that equip your team with the skills needed to recognise and respond to digital threats effectively. This proactive stance fosters a security-conscious environment, essential for successful digital transformation.

By adopting ISO 27001:2022, your organisation can navigate digital complexities, ensuring security and compliance are integral to your strategies. This alignment not only protects sensitive information but also enhances operational efficiency and competitive advantage.

What are the key considerations for implementing ISO 27001:2022?

Implementing ISO 27001:2022 involves meticulous planning and resource management to ensure successful integration. Key considerations include strategic resource allocation, engaging key personnel, and fostering a culture of continuous improvement.

Strategic Resource Allocation
Prioritising tasks based on comprehensive risk assessments is essential. Your organisation should focus on high-impact areas, ensuring they receive adequate attention as outlined in ISO 27001:2022 Clause 6.1. Utilising platforms like ISMS.online can automate tasks, reducing manual effort and optimising resource use.

Engaging Key Personnel
Securing buy-in from key personnel early in the process is vital. This involves fostering collaboration and aligning with organisational goals. Clear communication of the benefits and objectives of ISO 27001:2022 helps mitigate resistance and encourages active participation.

Fostering a Culture of Continuous Improvement
Regularly reviewing and updating your Information Security Management Systems (ISMS) to adapt to evolving threats is crucial. This involves conducting periodic audits and management reviews to identify areas for enhancement, as specified in ISO 27001:2022 Clause 9.3.

Steps for Successful Implementation
To ensure successful implementation, your organisation should:

  • Conduct a gap analysis to identify areas needing improvement.
  • Develop a comprehensive project plan with clear objectives and timelines.
  • Utilise tools and resources, such as ISMS.online, to streamline processes and enhance efficiency.
  • Foster a culture of security awareness through regular training and communication.

By addressing these considerations, your organisation can effectively implement ISO 27001:2022, enhancing its security posture and ensuring alignment with international standards.

Start your ISO 27001:2022 journey with ISMS.online. Schedule a personalised demo now to see how our comprehensive solutions can simplify your compliance and streamline your implementation processes. Enhance your security framework and boost operational efficiency with our cutting-edge tools.

How Can ISMS.online Streamline Your Compliance Journey?

  • Automate and Simplify Tasks: Our platform reduces manual effort and enhances precision through automation. The intuitive interface guides you step-by-step, ensuring all necessary criteria are met efficiently.
  • What Support Does ISMS.online Offer?: With features like automated risk assessments and real-time monitoring, ISMS.online helps maintain a robust security posture. Our solution aligns with ISO 27001:2022’s risk-based approach, proactively addressing vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Why Schedule a Personalised Demo?: Discover how our solutions can transform your strategy. A personalised demo illustrates how ISMS.online can meet your organisation’s specific needs, offering insights into our capabilities and benefits.

How Does ISMS.online Enhance Collaboration and Efficiency?

Our platform fosters seamless teamwork, enabling your organisation to achieve ISO 27001:2022 certification. By utilising ISMS.online, your team can enhance its security framework, improve operational efficiency, and gain a competitive edge. Book a demo today to experience the transformative power of ISMS.online and ensure your organisation remains secure and compliant.


Sam Peters

Sam is Chief Product Officer at ISMS.online and leads the development on all product features and functionality. Sam is an expert in many areas of compliance and works with clients on any bespoke or large-scale projects.

Related Topics

ISO 27001

The Compliance Era: How Regulation, Technology and Risk Are Rewriting Business Norms

Compliance isn’t the most glamorous thing in the eyes of most business leaders. They may see it as a necessity to avoid regulatory pressure, yet also something that can be handed to a junior member of staff or at least handled on an ad hoc basis. But with technology now the lifeblood of most modern businesses, criminals exploiting this and regulators and other stakeholders consequently pressuring companies to take compliance more seriously, such an approach is no longer sustainable. Compliance and governance must now be an ongoing exercise, supported by unified frameworks and leadership buy-in, to counter the growing plethora of information, cyber and supply chain risks businesses and their stakeholders face. How can this be achieved, though? Cyber Risk Is Business Risk A core driver in the shift of compliance from a checkbox exercise to a strategic priority in the day-to-day operations of businesses is "the sheer breadth of laws, regulations, standards, and good practice” with which they are now expected to comply, according to Stephanie Locke, head of product at AI experts Nightingale HQ. She says non-compliance can lead to significant reputational and financial implications. Notable examples of laws and regulations that have driven this change include the European Union's Network and Information Security Directive 2 (NIS2) and its landmark Artificial Intelligence Act - not to mention the varying data privacy standards in different parts of the world. Given that technology is deeply ingrained in all parts of an organisation's operations, Locke says boards are closely paying attention to these rules and now see IT risk as an enterprise one. With the technology ecosystem - and the regulatory landscape designed to keep it in check - both evolving rapidly, Locke says businesses are now forced to manage cyber risk continuously rather than periodically. She adds: “AI in particular creates new operational, legal, and reputation risks, with early enforcement patterns likely to mirror the disruptive impact GDPR had after launch.” Echoing similar thoughts, Jake Moore - global cybersecurity advisor at antivirus software maker ESET - says the rise of legal frameworks like NIS2 and the EU AI Act has turned “cyber risk into a business risk”. With this in mind, he says both laws necessitate “director-level accountability” and underscore that “compliance now dictates operating models, rather than the other way around”. He tells IO: “The cost of getting it wrong is expensive, and checkboxes can’t always cut it. Compliance may be a longer way of going about things, but it proves organisations can operate securely and at scale.” Regulators are Getting Smarter Regulators aren’t just moving at speed to introduce and tweak industry laws, though. They’re also working much faster behind the scenes to detect companies that may be in breach of their rules, thanks to advancements in artificial intelligence. Using AI, Lee Bryan - founder and CEO of compliance solutions provider Arcus Compliance - says regulators are able to “scan products, packaging, data, and documentation at a scale” and across “entire categories”. The technology is also allowing them to “spot gaps, inconsistencies, and false claims instantly”. He adds that such a major change in how regulators work means brands are no longer able to “hide behind volume, geography, or slow manual checks”, meaning they have no choice but to treat compliance as a crucial business activity or be hit with regulatory action. No Longer an Afterthought Regulators aren’t the only group that expects businesses to take compliance seriously. Other stakeholders, such as investors, customers and partners, are increasingly scrutinising the security and privacy posture of businesses before signing contracts - and even afterwards. In the face of rising supply chain cyber-attacks like the one experienced by SolarWinds, Locke of Nightingale says businesses are aware of the risks that third-party technology vendors can pose if they aren’t complying with cyber risk best practices and rules. She adds: “As a result, security and privacy posture have become core components of commercial and investment due diligence.” Specifically, when it comes to digital due diligence, George Tziahanas - vice president of compliance at archiving software specialists Archive360 - explains potential customers may be deterred from working with businesses that are unable to explain how they store, govern and delete data and see this as an “operational risk”. Existing stakeholders also expect high levels of regulatory compliance from the businesses they work with as they look to avoid being implicated in supply chain incidents.  Tziahanas says failure to do so could result in businesses experiencing “contractual penalties, regulatory action and reputational impact”. Avoiding Siloes Bad compliance isn’t simply businesses viewing it as a tick box exercise, though. Tziahanas explains that compliance gaps like “inconsistent controls, incomplete records, and unreliable data” can result in issues such as “false reporting, failed attestations, and over-retention”. To avoid this, businesses should ideally combine all the different dots of compliance - risk, security, privacy and continuity - into a single governance thread. According to Moore of ESET, doing so will result in their compliance and risk posture shifting from “reactive firefighting” to “proactive” - something that “saves money and hidden costs” at the same time. John Phillips, general manager of EMEA at accounting software provider FloQast, also sees the benefits of a unified and proactive approach to compliance and cyber risk management. He says teams that adopt this approach can “anticipate internal and external pivots, align early with leadership, and focus resources where they will make the biggest impact”. Complying with industry rules and best practices in the early stages of a new business venture or product can also be beneficial in the long run. For starters, Tziahanas of Archive360 says it’ll prevent “costly retrofits” as “classification, retention, and deletion rules” will have already been defined and implemented. A robust compliance posture will also help businesses build strong stakeholder relationships built on trust, adds Tziahanas. This is the key to “enabling faster deal cycles and smoother market entry”. Practical Steps When it comes to building and implementing a strong compliance strategy, respected industry frameworks like ISO 27001, ISO 42001, SOC 2 and ISO 27701 can be a good starting point. Describing them as a “starter playbook for governance”, Locke of Nightingale HQ says they provide businesses with all the “fundamentals’ needed to meet their compliance and governance obligations. She adds that such frameworks also enable organisations and their stakeholders to commit to “shared expectations and commitments” regarding compliance and governance. Clear risk visibility is also important. Bryan of Arcus Compliance explains that business leaders may not be aware of the risks they face because “data, documentation, and suppliers are scattered across systems”. He believes that this can be solved through the adoption of “agile systems, a risk-based approach, and a genuine compliance culture”. For ESET’s Moore, leadership buy-in is essential in making compliance and governance plans work. But that can only be achieved by educating leaders on the fast-expanding cyber threat landscape and how it can affect the business, he says. On the face of it, compliance seems a tedious task only to please regulators. But it can actually benefit businesses by allowing them to spot and solve risks before they cause serious damage. At the same time, it can attract potential customers and strengthen ties with existing ones - all of whom are concerned about recent supply chain cyber-attacks and want to ensure any business they work with takes these risks seriously.
ISO 27001

Five Security and Compliance Trends to Look Out for in 2026

What might the coming 12 months look like for cybersecurity and compliance professionals? We’ve scoured the news, absorbed the predictions of industry experts, and spoken to some directly to bring you our take on 2026. In no particular order, here are five trends that will shape the sector as we work our way through the year. AI Everywhere Benefits Attackers and Defenders As we observed in our State of Information Security Report 2025, AI represents both a threat and an opportunity to network defenders. A threat, in that malicious actors are already using large language models (LLMs) to assist with vulnerability research and exploit development, social engineering, victim reconnaissance, and more. But an opportunity, from both a business growth and cyber defence perspective. Agentic AI will be at the forefront of this dynamic in 2026. Although it was widely criticised as over-exaggerating AI’s role, the risks Anthropic flagged in November – of fully AI-orchestrated cyber-attacks – could become reality this year. On the other side, great strides are being made in SecOps, to bridge skills gaps and help to mitigate alert overload through use of agentic systems. Expect the journey to the “autonomous SOC” to gather pace. We can also expect the ISO 42001 standard to grow in popularity as more organisations look to manage their AI systems securely, ethically and transparently. Business take up has already grown from 1% to 28% between 2024 and 2025, according to IO data. The coming 12 months could see it hit mainstream adoption, as threat actors single out the AI attack surface for special treatment. The Compliance Burden Builds In our report, we warn of a “compliance crunch” for many organisations as they struggle to meet a growing regulatory burden with limited resources. Some 37% admit that compliance is a challenge, and two-thirds (66%) say that they’re finding it difficult to manage in house. Some 85% say more alignment across jurisdictions would help, while two-thirds (66%) argue that the speed of regulatory change makes it difficult to stay compliant. Unfortunately, things aren’t going to improve on this front in 2026. Given that it’s over 12 months since DORA came into force, we’ll see regulators start to sharpen their claws. NIS2 will also get real after being transposed into local law across much of Europe. Then there’s the Data Use and Access Act, the UK’s GDPR update, which will come fully into force by June. And the UK’s answer to NIS2, the Cyber Security and Resilience Bill, which is expected to pass into law. Some deviations from NIS2 will “require scrutiny”, Charles Russell Speechlys partner, Mark Bailey, tells IO. “For example, the bill introduces a broader definition of incidents, meaning organisations may need to reassess what qualifies as reportable and ensure internal processes are calibrated accordingly,” he explains. “Customer communications and contractual obligations will also need to be revisited, particularly where reporting may impact third-party data or expectations of confidentiality.” Software Supply Chain Risks Will Proliferate The open source ecosystem is creaking. Over the latter half of 2025 we witnessed several major threat campaigns spreading across npm. Key among these was IndonesianFoods, a prolific, automated campaign that flooded the registry with tens of thousands of spammy packages. Experts warned the same techniques could be used for more malicious ends. Perhaps even more worrying was the Shai-Hulud worm, whose two waves led to the exposure of developer and cloud secrets on a similarly massive scale. “Open source ecosystems make perfect testbeds for this kind of automation: frictionless publishing, minimal gatekeeping, and an enormous attack surface,” Sonatype CTO, Brian Fox, tells IO. “Attackers have figured that out. Unless we evolve our defences just as quickly, these self-propagating worms will become the default playbook, not the exception.” Randolph Barr, CISO at Cequence Security, adds that AI will accelerate the trend. “The fact that the [IndonesianFoods] payloads were inactive makes this scenario even more worrying,” he tells IO. “The attackers took their time, building trust and distribution over time so they could use it as a weapon later. That's a big change: you don't need malicious code on the first day to create considerable risk down the line. So certainly, efforts that are highly automated and worm-like that take advantage of the size and availability of package registries will grow, not shrink.” Skills and Budgets Set to Lag According to the latest ISC2 Cybersecuity Workforce Study, skills shortages in cyber remain worryingly common. Over a quarter (27%) of global respondents cited governance, risk and compliance (GRC) skills as in high demand. Stalling budgets and a dearth of talent aren’t helping. According to ISACA’s State of Cybersecurity research, over half of professionals (54%) say teams are underfunded, while 58% report ongoing understaffing. ISACA chief global strategy officer, Chris Dimitriadis, tells IO that the gap between fast-evolving threats and slow-moving investment will grow in 2026. "Cyber and compliance teams will be expected to take on far greater responsibility for AI governance and regulatory alignment as new standards come into force. While regulation is a welcome step toward strengthening digital resilience, it also introduces significant operational pressure, particularly when over a quarter of organisations have no plans to hire for digital trust roles in 2026,” he adds. "For cyber-compliance teams, 2026 will bring heavier workloads, rising expectations and increasingly complex landscapes. AI tools will be essential, but technology alone cannot close the vulnerability gap. Resilience will hinge on people – organisations that invest in wider talent pathways, continuous upskilling and AI-literate teams will be the ones able to turn powerful technologies into meaningful, real-world protection." Continuous Compliance and Automation Unlock Value With the threat landscape evolving so rapidly, attack surfaces expanding, and regulatory burden growing, standards like ISO 27001 will increasingly be prioritised in 2026. Their best practices underpin most of the cybersecurity legislation hitting the statute books these days, which will help to simplify compliance. But, in the case of ISO 27001 at least, they’re also moving towards a model of “continuous compliance” that will help organisations enhance cyber resilience in the coming years. The Plan-Do-Check-Act (PDCA) cycle promotes continuous monitoring, measurement and adaptability — critical endeavours in these volatile times. With limited skills and resources to hand, many organisations will turn to automation to help them harness these benefits. By letting machines do the grunt work of security controls monitoring, audit trails, reporting and deadline reminders, stretched teams can focus on the work that matters. This is just a small taste of what to expect in the coming 12 months. Security and compliance teams will no doubt face some formidable challenges over the year. Those best placed to ride them out will be the ones that view compliance as a journey of continuous improvement, not a once-a-year effort.
ISO 27001

State of Information Security Report: 11 Key Statistics and Trends for the Manufacturing and Utilities Industry

This year’s State of Information Security Report divulged the myriad challenges and opportunities that security leaders faced over the last 12 months. From supply chain management to addressing AI risk, the changing cyber threat landscape is forcing businesses to reassess and realign security priorities. Our respondents included over 160 security professionals working in the manufacturing and utilities industry across the US and the UK. Their responses shed light on the core information security threats the industry faces, the actions leaders have taken to address cyber challenges, and their priorities for building digital resilience over the next 12 months. Discover the top 11 information security statistics every manufacturing and utilities leader should know. Key Information Security Statistics for the Manufacturing and Utilities Industry Sophisticated Cyber Threats The rise of “as-a-Service” cyber threats e.g. Ransomware-as-a-Service, Phishing-as-a-Service) is the top information security challenge (46%) for manufacturing and utilities organisations. AI phishing and AI-generated misinformation and disinformation are the top emerging threat concerns for manufacturing and utilities organisations (40%). 40% of manufacturing and utilities businesses experienced phishing/vishing incidents in the last 12 months. Organisational Challenges 36% of manufacturing and utilities organisations say employees have used GenAI without organisational permission or guidance. 43% of manufacturing and utilities organisations say they adopted AI technology too quickly and are now facing challenges in scaling it back or implementing it more responsibly. Supply Chain 46% of manufacturing and utilities organisations have been impacted because of a cybersecurity or information security incident caused by a third-party vendor or supply chain partner in the last 12 months. 40% of manufacturing and utilities organisations require suppliers to be ISO 27001 certified; the same percentage require suppliers to be GDPR compliant. Information Security Priorities 90% of manufacturing and utilities organisations agree that every business should have someone responsible for information security at board level. Manufacturing and utilities organisations ranked improving incident response preparedness and recovery capabilities as their top information security priority (31%). AI Investment 70% of manufacturing and utilities organisations plan to increase their spend on AI and machine learning security applications. 98% of manufacturing and utilities organisations plan to invest in GenAI threat detection and defence in the next 12 months. The Cyber Threat Landscape While sophisticated AI-driven threats present an evolving challenge for organisations, long-standing methods of cyberattack are still drawing focus for manufacturing and utilities organisations. 40% of respondents from the industry stated their organisation had experienced phishing or vishing incidents in the last 12 months. Phishing in its latest, AI-powered form was also top of mind when we asked respondents to disclose their biggest emerging threat concerns. Respondents ranked AI phishing and AI-generated misinformation and disinformation as their top emerging threat concerns (both 40%). Similarly, manufacturing and utilities organisations cited the rise of “as-a-service” cyber threats like ransomware-as-a-service and phishing-as-a-service as the top information security challenge (46%) they currently face. Respondents ranked this challenge ahead of issues like the information security skills gap and securing emerging technologies such as AI, ML and blockchain (both 45%). These crime-as-a-service operations see expert crime groups act as service providers on behalf of benefactors, usually in exchange for payment or a portion of a payout. With the barrier to entry for would-be cybercriminals effectively removed, phishing and ransomware attacks are more accessible than ever for malicious actors. People and Process Challenges Challenges around AI management extend into how staff and even leadership teams are using and implementing the technology. More than one in three (36%) manufacturing and utilities respondents said employees have used generative AI (GenAI) without organisational permission or guidance. This ranked as the top employee information security mistake made by employees, closely followed by shadow IT (35%) and using personal devices for work purposes without proper security measures (34%). But employees aren’t the only ones jumping the gun when it comes to AI use; this approach extends to leadership teams. 43% of respondents said their organisation adopted AI technology too quickly and is now facing challenges in scaling it back or implementing it more responsibly. With AI technology advancing rapidly and businesses and individuals alike rushing to reap the benefits, guardrails for use and regulatory guidelines are still trailing behind. However, the EU AI Act, which is coming into effect in stages, requires AI providers to take appropriate measures to mitigate and manage AI system risk. For organisations implementing AI, the ISO 42001 standard provides best practice guidance for building a secure, ethical AI management system (AIMS) across AI system development, implementation, management and continuous improvement. Securing the Supply Chain Nearly half (46%) of the manufacturing and utilities organisations we surveyed said they’d been impacted because of a cybersecurity or information security incident caused by a third-party vendor or supply chain partner in the last 12 months. 15% had been impacted by multiple incidents. These organisations faced repercussions ranging from data breaches (43%) to business interruptions requiring emergency responses (36%). One in three (34%) experienced temporary system outages or operational disruption. With incidents targeting the supply chain becoming increasingly common, manufacturing and utilities businesses are treating supply chain and vendor security as a priority. Nearly four in five (79%) of manufacturing and utilities industry respondents said their organisation has strengthened third-party and vendor risk management in the last 12 months, and 19% said they plan to do so in the coming 12 months. 55% also plan to increase their spend on supply chain and third-party vendor security in the next 12 months. Businesses are also responding by requiring suppliers to evidence their information security and cybersecurity posture. 40% of manufacturing and utilities respondents require suppliers to be certified to the information security standard ISO 27001; the same percentage require GDPR compliance. AI management also remains a top priority in supply chain security – 35% of respondents said their organisation requires suppliers to be ISO 42001 certified. Information Security Priorities As businesses across the globe contend with the moving target that is the cyber threat landscape, manufacturing and utilities organisations are focusing on preparedness. Respondents ranked incident response preparedness and recovery capabilities as their top information security priority for the next 12 months (31%). This was followed by enhancing defences against AI-generated threats such as phishing and deepfakes (30%) and enhancing employee security awareness and behaviour (27%), both of which align with the top challenges and concerns noted by Report respondents. 90% of manufacturing and utilities respondents agreed that every business should have someone responsible for information security at board level, supporting the need for organisation-wide information security awareness. AI Threats and Opportunities Manufacturing and utilities businesses are leveraging AI for security while preparing to defend against the technology’s more nefarious uses. 70% of manufacturing and utilities businesses plan to increase their spend on AI and machine learning security applications, bolstering existing security posture and reducing the workload for often overloaded security and compliance teams. Additionally, 98% of manufacturing and utilities organisations plan to invest in GenAI threat detection and defence in the next 12 months. As mentioned, enhancing defences against AI-generated threats like deepfake and phishing ranked as respondents’ second highest information security priority. Here, strategic investment will put organisations in a stronger position to identify and defend against these threats. Looking Ahead Security leaders in the manufacturing and utilities industry are navigating a complex, set of information security challenges. However, their responses to this year’s Report show that they’re working strategically – identifying AI threats and opportunities, tightening supply chain security requirements, and working to improve employee information security awareness, from board-level to new starters. They’re building and implementing AI systems more securely and ethically and investing in improved information security measures. By proactively embedding information security best practices organisation-wide, manufacturing and utilities organisations can streamline their compliance efforts, grow customer trust, and improve digital resilience. We look forward to seeing how businesses in the sector have adapted to the changing cyber landscape in next year’s Report.
ISO 27001

How Calrom Bolsters Customer Trust with ISO 27001 Certification

Founded in 2007, Calrom is a software development company that specialises in group booking solutions for airlines. As part of the Travel Innovation Group, Calrom powers its sister brands, Lime and Aviate, with comprehensive flight booking technology designed for tour operators and travel agents.

Through close partnerships with airlines and industry stakeholders, Calrom gains deep insight into industry-specific challenges, enabling them to design solutions precisely tailored to operational needs.

As global scrutiny of supplier and third-party vendor security intensified, Calrom’s customers began requiring ISO 27001 certification as a prerequisite for continued partnership. Calrom recognised that certification was no longer optional. It was essential to demonstrate their commitment to information security and maintain customer trust.

Beyond meeting customer requirements, Calrom aimed to strengthen its cybersecurity and reduce operational risk. Building an ISO 27001-compliant Information Security Management System (ISMS) would address all three objectives simultaneously.

While Calrom had established a solid security foundation, including policies, controls, an asset register, and network and vulnerability monitoring tools, the business lacked a ISMS. With no prior experience in ISO 27001 implementation, Calrom needed expert guidance to navigate the certification process efficiently and ensure a successful outcome.

“It was difficult to know where to start and what the best way of achieving our goals was, so we needed a solution to help us and point us in the right direction.”

Chris Jones Cyber Security Analyst and Designated Information Security Manager, Calrom

Calrom adopted the IO platform to support their ISO 27001 compliance and certification journey, centralising their policies, controls, tasks, risk assessment and treatment, evidence management and more. Calrom also followed our 11-step Assured Results Method (ARM) to streamline the compliance process.

“The templates provided were very useful in helping us understand what information was required and gave good examples of the format expected.”

Chris Jones Cyber Security Analyst and Designated Information Security Manager, Calrom

Using ARM, team Calrom easily identified and implemented the ISO 27001 controls relevant to their business. They utilised the full functionality of the platform, including policy and procedure templates to meet ISO 27001 control requirements, a corrective actions and improvements track to monitor and resolve any issues, the risk management function to identify and mitigate risks, and more.

“The Assured Results Method and the templates that were provided in effect ensured we met each of the controls of ISO 27001 and reduced the time needed to achieve certification.”

Chris Jones Cyber Security Analyst and Designated Information Security Manager, Calrom

“The biggest difference was the speed at which we could complete the controls, and that the platform provided us with the knowledge of the steps required.”

Chris Jones Cyber Security Analyst and Designated Information Security Manager, Calrom

Using the IO platform to centralise compliance management and ARM to guide implementation, Calrom built a robust, ISO 27001-compliant ISMS and successfully achieved ISO 27001 certification in just 12 months.

“Without the IO platform, I strongly believe we would still not have achieved compliance by now and would still be continuing to implement the policies, procedures and controls and all of the other aspects of our ISMS.”

Chris Jones Cyber Security Analyst and Designated Information Security Manager, Calrom

Being ISO 27001 certified has met and exceeded the business’s initial objectives. Certification has enhanced Calrom’s customer relations, enabling the team to maintain and foster customer trust by demonstrating the business’s commitment to security.

In addition, with ISO 27001 controls in place and the business continuing to align with the standard’s requirement for continuous improvement, Calrom now has a robust, evolving approach to information security that can adapt to business changes and new requirements.

“I would highly recommend IO and their platform to anyone wanting to achieve ISO 27001 and implement a robust Information Security Management System.”

Chris Jones Cyber Security Analyst and Designated Information Security Manager, Calrom

Chris also praised the support Calrom received from the IO customer success and support teams throughout the certification process. [They] said: “The team have been great to work with and very helpful. They have provided a lot of guidance and support, and always respond in a timely manner to any communications we have with them.”

Now that Calrom has achieved ISO 27001 certification, Chris and the team are looking at additional certifications for the future, including artificial intelligence, such as the best practice ISO 42001 certification and business continuity planning certification ISO 22301.

ISO 27001

Cyber-Attacks Are Impacting GDP: Here’s What That Means for Businesses

As resilience is mandated by a growing number of regulations, how can every organisation do their part? By Kate O’Flaherty Businesses across the UK are dealing with a sobering issue: Cyber-attacks are now having a measurable impact on GDP. Reports from the UK’s Cyber Monitoring Centre (CMC) and ONS suggest the Jaguar Land Rover (JLR) hack dented GDP growth, with the economy expanding by just 0.1% in the quarter from July to September as car production was dragged to a 73-year low. Significant cyber incidents cost the UK economy £14.7 billion annually (~0.5% of GDP), and IP-related attacks alone could cost up to £8.5 billion, according to research from the department for Science, Innovation and Technology and Alma Economics. If single large incidents such as the JLR attack can measurably affect GDP, the cumulative effect of thousands of smaller attacks is likely to be even greater. It’s a concerning picture that reframes cybersecurity as a systemic economic risk, beyond business and IT. As resilience is mandated by an increasing number of regulations, how can every organisation do their part to minimise the impact of cyber-attacks on the UK economy? The Cost Impact The ONS figures are new, but the cost impact was always there. Every time a data ransom is paid, or a company is defrauded, the impact is around five times the value in lost opportunities and recovery costs, Harry Mason, head of client services at managed IT service provider Mason Infotech tells IO. He cites the JLR breach as an example. “The attack halted production for several weeks, creating a huge backlog to clear once they were back up and running. This was also compounded by reputational damage from press coverage and loss of trust from consumers.” Although for SMEs, the associated cost from cyber-events may be smaller, it is “no less damaging” and can ultimately result in businesses going under, he warns. Today, modern ransomware, business-email compromise, cloud misconfiguration attacks and data-theft campaigns result in “longer recovery times and higher remediation costs”, Dominic Carroll, director of portfolio at e2e Assure tells IO. “Attackers also increasingly destroy backups or sit dormant until log retention windows have passed, meaning organisations can’t easily reconstruct what happened or recover cleanly, thereby further prolonging business disruption.” The high-profile attacks against the UK this year have revealed just how critical these organisations are to the economy, says Carroll. “We simply can’t afford to lose that kind of productivity, nor rely on government bailouts,” he warns. One of the biggest knock-on effects on the wider economy is related to investment. In an already risk-averse marketplace, attracting investors is going to be even more difficult if there’s a threat of being halted by a cyber-attack or other IT related downtime, says Mason. “For individual businesses, this means they need to be 100% focused on ensuring they have a security strategy in place to attract customers and investors – and keep existing ones.” Cyber Resilience and Compliance Frameworks In this challenging economic environment, cyber resilience and compliance frameworks such as ISO 27001, Network and Information Systems 2 (NIS 2) and Cyber Essentials are more important than ever for all businesses. Frameworks such as these provide structured guidelines and best practices to help organisations identify, manage and reduce the impact of cyber risks, says Emma Hastings-Bray, legal director at Blacks Solicitors. Adoption can also demonstrate a business’ commitment to compliance and accountability to their customers, partners, boards and regulators. “The frameworks can assist with ensuring that cyber resilience is embedded at board-level, as well as providing measurable metrics to assess performance and meet UK data protection requirements,” adds Hastings-Bray. These regulations are especially key because they focus on the supply chain – an important factor in shoring up national security, says Carroll. He points out that NIS2 now requires entities in scope to risk assess critical supply chains. Meanwhile, the US has seen the introduction of Cybersecurity Maturity Model Certification (CMMC 3.0), which will mandate security in the supply chain for all Department of Defence contracts from October 2026. Closer to home, the Cyber Security and Resilience Bill formalises supply chain security for in-scope organisations, says Carroll. Structured Resilience Planning As cyber-attacks threaten to further dent GDP, structured resilience planning will help to reduce the cumulative impact. Among the benefits, structured resilience planning ensures organisations can “break the cycle of economic drag” caused by cyber-attacks, says Carroll. “When companies routinely validate their detection coverage, run attack simulations and hard-wire rapid containment into their operations, incidents stop becoming week-long outages and turn into short-lived disruptions. That shift alone removes a huge amount of lost output from the economy.” Structured resilience planning can help “soften the economic blow” of cyber-attacks by preventing incidents from spiralling into long disruptions, agrees Kerry Parkin, founder of The Remarkables. “When organisations plan for both the technical and communication response, they recover faster.” As part of this, a clear comms strategy “helps leadership act quickly, keeps people informed and prevents the confusion that damages confidence across supply chains”, she says. The National Resilience Picture With cybersecurity and compliance on the national agenda, every firm’s effort matters in the wider resilience picture. Businesses often assume they are too small to matter, but “one weak link can expose an entire network”, Parkin points out. With this in mind, building basic cyber hygiene, having a rehearsed comms plan, and being honest about vulnerabilities strengthen the organisation – as well as the wider economy, she says. Regulation already mandates that businesses must recognise the threats posed by cyber-attacks and be prepared. For example, under UK data protection law, all organisations are legally required to implement appropriate measures that protect personal data, says Hastings-Bray. “Resilience should be a priority for every business, from assessing supply chains and completing due diligence, through to training internal security champions and delivering regular staff education.” The economic downside associated with cyber-attacks is certainly a motivating factor for businesses. However as a collective, there is still “huge work to be done” to ensure everyone is taking security seriously, says Mason. “This is particularly important for those in a position of leadership, as they have the ability to make changes and also ensure that buy-in filters down through the business.”
ISO 27001

What the Salesforce Breaches Teach Us About Shared Accountability

2025 hasn't been a good year for Salesforce clients. A shady criminal group mounted a series of attacks on its customers, ultimately affecting organisations ranging from tech giants like Google and Cisco to luxury brands including Chanel and Louis Vuitton. Even critical infrastructure providers such as Qantas Airways, FedEx, and TransUnion have been nobbled by the attackers, called either Scattered LAPSUS$ Hunters, ShinyHunters, or variations thereof. The group, which seems to be a coalition of members from various other criminal gangs, has reportedly compromised over 760 organisations and roughly 1.5 billion records. But Salesforce says that this isn't a problem of its own making. How did an attack become the biggest source of data theft in 2025, without the vendor admitting any responsibility? It's easy to understand why Salesforce refused to carry the can for this one. The attackers don't appear to have exploited any vulnerabilities in the vendor's online platform. Instead, the attackers got into the Salesforce systems via flaws in customer security, such as inadequate OAuth governance, missing MFA enforcement, poor integration vetting, and social engineering susceptibility. A typical method for gaining access was to create a fake version of the Salesforce Data Loader app, which customers use to download their Salesforce data. The Scattered LAPSUS$ crew used this fake software to send a device code to Salesforce's servers, which is supposed to be entered by a Salesforce user. Then, one of the gang would call the victim and pretend to be from their company's helpdesk. They'd ask the victim to log into Salesforce and enter the device code, unwittingly confirming the fake app (which they know nothing about) as legit. Then, the criminals get access to the victim company's sensitive Salesforce data. These failures in customer security aren't anomalies. Gartner predicts that 99% of cloud security failures through 2025 will be the customer's fault. Recent research from AppOmni also shows that 70% of SaaS incidents stem from a mixture of customer-controlled permission issues and misconfigurations. Understanding the Shared Responsibility Model The worry here is that customers for vendor software might be lulled into a false sense of security by relying on the vendor's platform alone, especially when that software is hosted in the cloud. But in reality, vendor platform security doesn't automatically equal data security. The cloud industry even has a name for this: shared responsibility. It's a mutual understanding of where the service provider/software host's responsibility ends, and the customer's begins. Many enterprises don't seem to understand this; 53% of AppOmni respondents describing themselves as confident in security do so based on the strength of their vendors' controls. As evidenced by the Salesforce attacks, even those that do get it often aren't handling security well enough on their side of that line. For Salesforce and SaaS platforms, the vendor typically covers secure platform infrastructure, core application code, availability guarantees, and built-in security features like MFA capabilities and encryption. That leaves customers responsible for measures such as managing user accounts, enforcing MFA and managing OAuth tokens, implementing least privilege access, handling third-party integrations, and configuring security settings appropriately. It's also up to users to train staff on security threats. Given the social engineering involved in these attacks, that seems to have been a weak point. However, even if attackers do manage to fool users, there should be an element of monitoring user activity and detecting anomalies. How Compliance Frameworks Can Help Prevent These Breaches These are weaknesses that ISO 27001:2022, SOC 2, and NIS 2 explicitly address through access control, supplier oversight, and configuration management requirements. Companies should look to these operating standards to improve their stance and avoiding becoming another in a list of pwned brands. For example, the access control series A.5.15 requires establishing documented access control policies by implementing need-to-know and need-to-use principles. A.5.16 handles identity management, while A.5.17 explores the management of authentication information, requiring secure storage and transmission, encryption at rest and in transit, and regular rotation. A.5.18 covers access rights. It requires formal processes for provisioning, modifying, and revoking access rights, with authorisation from asset owners, and regular reviews at least annually. Compliance managers could also look at A.8.2, governing privileged access rights. These controls require centralised registries, regular audits, and validation of legitimacy before granting access. Those are precisely the measures that would have prevented social engineering victims from authorising malicious apps. This isn't the first time we've seen companies suffer from breaches because of their own configuration choices (or ignorance of such choices). The string of breaches affecting Snowflake customers in 2024 springs to mind, stemming as it did from stolen credentials and a lack of MFA (even though Snowflake offered MFA). As companies rely increasingly on SaaS and put their most sensitive data into these infrastructures, the onus is on them to ensure they guard their own digital gates to these systems properly.
ISO 27001

Build Once, Comply Everywhere: The Multi-Framework Compliance Playbook 

The Compliance Complexity Problem   As the regulatory burden on businesses grows, so does the need for multi-framework compliance.   Faced with requirements that vary by regulation and geography, organisations risk duplicating work and placing unsustainably high levels of demand on both teams and resources. This scattered approach can lead to compliance team burnout, operational inefficiencies, and increased costs. But compliance should support your business growth – not slow it down.  In this playbook, you’ll learn top tips for consolidating your compliance to align with key standards, break down silos and meet your strategic goals. Discover your step-by-step guide to building strong compliance foundations and scaling them across multiple frameworks and requirements.   The Strategic Case for Consolidation   Approaching multiple standards and regulations on an individual basis is achievable, but inefficient.   For example, the General Data Protection Regulation (GDPR), Network and Information Security (NIS 2) Directive, and information security standard ISO 27001 are all relevant to businesses operating in the EU. In-scope businesses face navigating multiple sets of requirements, with a high level of commonalities but fundamental differences.   Nearly two thirds (65%) of respondents to our State of Information Security Report 2024  agreed that the pace of regulatory change is making it harder to comply with information security best practices. A third (33%) say compliance with regulations and industry standards is a challenge they currently face. Additionally, nearly a third (32%) of respondents to our State of Information Security Report 2025 said that they faced information security and compliance team burnout due to increasing workload.  Building a scalable, adaptable approach to compliance is vital to effectively support compliance professionals. It also enables businesses to proactively prepare for – and more easily respond to – evolving regulatory requirements. Consolidating compliance saves time, ensures consistency and supports both operational and strategic compliance goals.  Time savings: Address related requirements across multiple frameworks with a single unifying policy or control, streamlining your compliance team’s workload and eliminating redundancies.  Reduced risk: Assess and meet your compliance obligations across multiple regulatory requirements with a consolidated risk register, identifying and treating risks more effectively.  Consistent evidence handling: Improve evidence management processes, reduce redundancy, and streamline audit processes.  Enhanced visibility: View the real-time status of your compliance across multiple frameworks and easily identify action areas.  Reduced costs: Streamline your compliance processes, reduce time spent on compliance tasks, and improve risk management to unlock cost savings.  Peace of mind: Unifying compliance management assures board and leadership teams that all your compliance obligations are being met efficiently and effectively.  Streamlined market entry: Access new markets faster by pre-addressing compliance requirements in required frameworks.  Build stakeholder trust: Demonstrable compliance maturity supports your business in building trust among a range of stakeholders.  How to Build Once and Comply Everywhere  Coalfire’s Compliance Report 2023 found that almost 70% of service organisations need to demonstrate compliance or conformity to at least six frameworks spanning information security and data privacy taxonomies, underscoring the need for a strategic, unified approach to compliance management.   A unified approach includes:  Mapping controls across frameworks: Mapping requirements across multiple frameworks enables you to identify areas where controls overlap and your compliance can be streamlined. This also enables you to identify and address potential gaps.  Let’s say you’re preparing for NIS 2, but your organisation is already ISO 27001 certified. Instead of starting from scratch, you can adapt your existing ISO controls to meet NIS 2’s expectations on supply chain security - saving weeks of effort and dramatically speeding up time to readiness.  Using pre-built templates: Get a head-start on your multi-framework compliance, accelerate setup, and align evidence using specialist pre-built controls and templates. These templates are aligned with specific standard and regulatory requirements and designed to streamline the compliance process while reducing manual workload for your compliance team. Crucially, you can also update and amend pre-built templates to fit your organisation’s specific requirements and objectives.  Proactively monitoring compliance: Use automated alerts and regulatory tracking tools to stay informed about compliance requirements and regulatory changes. You can also use automated monitoring tools to proactively assess your organisation’s compliance and flag potential issues in real-time.  Adapting to Your Unique Risk Landscape  Customising Pre-Built Templates  Pre-built templates are a quick win, but not a set-and-forget exercise. It’s vital to consider the templates in the context of:  Your industry  Your business needs and objectives  The regulatory landscape impacting your organisation  Existing internal processes.  Taking this additional context into consideration will enable you to customise pre-built templates and build on them so they align with multiple relevant frameworks as well as your organisational goals. Regularly reviewing these policies and controls will also ensure that they remain up-to-date and relevant.  Leveraging Compliance Automation  Strategically combining automation and human decision-making can support your multi-framework compliance efforts, reducing manual workload. Automation plays a key role in streamlining time-consuming admin tasks such as evidence collection, control monitoring, task reminders, incident flagging, audit trails and report generation, freeing up your team to focus on strategy, risk mitigation and delivering on business objectives.   However, for tasks such as risk assessments, incident response, decision-making and compliance strategy, human oversight remains vital. Using automation to support decision-making rather than replace it will empower your compliance team when creating a resilient, adaptable compliance strategy that can be scaled across frameworks.  Strategic Risk Management  Taking a risk-based approach is vital to successful compliance with frameworks like ISO 27001 and NIS 2. By centralising your risk tracking with a unified approach to multi-framework compliance, you can unlock a comprehensive view of your organisational risk and risk management across frameworks. This high level of oversight ensures that you can respond strategically to new and evolving risks, align with regulatory requirements and evidence decision-making for audits.  In addition, the strategic risk management approach enables you to clearly report compliance and security statuses at board level and can even support bids for increased security or information security budget, backed up with live risk information across multiple frameworks.   Turning Strategy into Action: How IO Supports Unified Compliance  Using the IO platform as a single source of truth, you can centralise your compliance management, remove duplication, and seamlessly manage your multi-framework compliance strategy.   Control mapping: Link your evidence, policies and controls across frameworks, automatically generate audit trails, and instantly generate reports to demonstrate your compliance status.  Pre-built templates: IO provides pre-built policy and control templates, which you can adopt, adapt, or add to so they align with your business’s unique needs and risks while maintaining an audit-ready structure.  Automate compliance tasks: Your automated reminders trigger when risks, policies and controls are due to be reviewed, so nothing slips through the cracks.  Efficiently manage risk: Centralise risk management to seamlessly address risk across multiple frameworks in one location.  Achieve efficient, centralised compliance, without burning out your team or adding risk.  Unlock Centralised, Scalable Compliance  An effective multi-framework compliance strategy will enable you to build your compliance base once, then scale across frameworks with confidence. Whether your business needs to align with two frameworks or ten, mapping the overlap between requirements, identifying areas to automate and using the right tools to consolidate your work can streamline your compliance management.   From Scattered to Streamlined: Your Five Step Roadmap to Unified Compliance Success  Step 1: Identify Your Compliance Obligations The compliance landscape is continually evolving. Your compliance obligations will change as your business grows and develops, you enter new markets, or you submit tenders for work with prospects in highly regulated industries. Identifying the regulations that apply to your organisation and your specific compliance obligations will give you vital insight into the frameworks you need to implement.   Example compliance obligations include:  The Digital Operational Resilience Act (DORA) if your organisation is a financial entity or a third-party ICT provider to financial entities  The Payment Card Industry Data Security Standard (PCI DSS) if your organisation stores, processes or transmits credit or debit cardholder data  The Trusted Information Security Assessment Exchange (TISAX) if your business supplies or provides services to automotive manufacturers.  Step 2: Map Your Frameworks and Highlight Overlapping Controls Next, map the requirements of the frameworks you’ve already implemented and those you plan to implement or comply with. By mapping the common requirements addressed by similar controls across different frameworks, you can avoid duplication and streamline your compliance management.  For example, you may currently comply with ISO 27001 and plan to comply with DORA and NIS 2 as part of your organisation’s growth plans. There are overlapping supply chain management requirements outlined in:  DORA chapter V  NIS 2 article 21   ISO 27001 A.5.19, A.5.20 and A.5.21   Rather than implementing policies and controls for each framework, you can address the above requirements by reviewing your existing ISO 27001 policies and controls. Using your mapping documentation, you can identify any updates needed to ensure alignment with the requirements of NIS 2 and DORA.   Step 3: Trial Automated Evidence Collection in One Area Automated evidence collection can reduce manual workload, improve accuracy and support centralised compliance management. To trial automating your evidence collection, we suggest choosing a specific focus area, such as staff information security training and awareness – a requirement for ISO 27001 compliance.   An effective automated solution will integrate with your organisation’s third-party software. You can set your chosen solution up to automatically gather evidence of compliance activities taking place using that software, for example training sessions assigned to each staff member and their completion status. The solution will log this evidence, enabling you to demonstrate how your business meets compliance requirements.  Step 4: Review Tool Options to Consolidate Risk Registers Multi-framework compliance often requires a more cohesive solution than manually updated spreadsheets, emails and documents can offer. Relying on these methods can make tasks such as risk register consolidation intensive and time-consuming for compliance teams.   However, using a centralised compliance platform will allow you to create a risk and assign it to multiple frameworks in just a few clicks, rather than maintaining and updating disconnected risk registers.  A centralised compliance platform will also support your compliance team in completing the following tasks across multiple frameworks:  Automated task management and reviews  Risk management  Evidence collection  Policy and procedure creation  Control implementation  Incident response planning  Employee awareness and training  Audit trail generation.  We suggest identifying and shortlisting potential compliance platforms using trusted business software and service review platforms such as G2.  Step 5: Book a Demo or Discovery Session Once you’ve created your shortlist, reach out to your potential compliance platforms to book demos or discovery sessions and learn how each platform aligns with your compliance requirements.   If you’re looking to unlock multi-framework compliance confidence with IO, we’re ready to help - simply book your demo to see the platform in action.  Future-Proof Your Compliance  New regulations are already just around the corner: the EU AI Act is now coming into effect in stages, while the UK is developing the Cyber Security and Resilience Bill and the Data Use and Access Bill. Regulators aren’t going to wait for your business to be prepared, but with a multi-framework compliance approach, you can prepare in advance.  As global regulations continue to evolve, implementing a scalable approach to compliance will soon become a competitive differentiator, allowing your organisation the agility to adopt and comply with new regulations and frameworks. A unified system isn’t just a present-day fix; it's a future safeguard. 
ISO 27001

The NCSC Says “It Is Time to Act”, But How?

It’s unusual to see an open letter from a business leader at the start of a government cybersecurity report. Especially someone whose company has just suffered a humiliating breach. But these are unusual times. And the message is critically important. That’s why GCHQ’s National Cyber Security Centre (NCSC) made room for Co-op Group CEO, Shirine Khoury-Haq, at the start of its Annual Review 2025. Her message, echoed and amplified throughout the document, was simple: preparation is everything. But how do company leaders ensure they build sufficient cyber resilience into their organisation today, in order to ensure business as usual in the event of a breach tomorrow? Nationally Significant Incidents Surge The numbers from the past year tell their own story. The NCSC claims that almost half (48%) of the incidents its Incident Management team responded to over the past year were “nationally significant”. That amounts to 204 separate incidents, or four per week. Some 4% (18) are categorised as “highly significant” – a 50% annual increase. These are one step down from the maximum severity, which denotes incidents that can have severe economic/social consequences or loss of life. But they still signify cyber-attacks and breaches which could have a serious impact on central government, essential services, and a large proportion of the UK population or economy. Interestingly, 29 incidents managed by the NCSC over the period stemmed from just three vulnerabilities: CVE‑2025‑53770 (Microsoft SharePoint Server), CVE‑2025‑0282 (Ivanti Connect Secure, Policy Secure & ZTA Gateways) and CVE‑2024‑47575 (Fortinet FortiManager). That immediately highlights some low-hanging fruit for organisations choosing to deploy risk-based patch management programmes. This low-hanging fruit is everywhere if business leaders were only motivated enough or aware of the need to find it, says NCSC CEO Richard Horne. In his foreword, he describes the challenges faced by British organisations as growing at “an order of magnitude”. Horne concludes: “Cybersecurity is now critical to business longevity and success. It is time to act.” A Letter to the FTSE 350 This emphasis on action is backed by recent catastrophic cyber-related outages impacting Jaguar Land Rover (JLR), M&S and Co-op group, to name just three. Some estimates put the total losses experienced by these companies and their suppliers at close to £1bn. It’s part of the reason why the report directly exhorts business leaders to stop treating cyber as a matter for the IT department, and start realising its critical importance to business growth and the UK economy. It’s why it features the Co-op Group’s Khoury-Haq. And why Horne exclaims: “All business leaders need to take responsibility for their organisation’s cyber resilience.” It’s also why the report promotes various NCSC initiatives like: The Cyber Governance Code of Practice: designed to help boards and directors better manage digital risks The Cyber Governance Training programme, which aligns with the code’s five core principles: risk management, strategy, people, incident planning, response and recovery, and assurance and oversight NCSC guidance on “Engaging with Boards to improve the management of cybersecurity risk”, which helps CISOs to communicate more effectively with their board The Cyber Security Culture Principles, which outline what good security culture looks like and how to change behaviours The Cyber Action Toolkit, to boost cyber awareness among small business leaders It’s also why, in what appears to have been a coordinated move, the government has written to the CEOs of the FTSE 350 imploring them to recognise the scale of the threat. “For too long, cybersecurity has been a concern of the middle management and only gets escalated to the seniors in a crisis. It’s not a case of if you will be the victim of a cyber attack, it’s about being prepared for when it does happen,” said security minister Dan Jarvis at the review’s launch. Tellingly, he sought to emphasise the competitive advantage that best practice cyber can deliver for businesses. Building Resilience The good news is that while the threat is intensifying, the NCSC claims most activity it sees is not radically new, whether state sponsored or the work of groups like Scattered Spider. That should make achieving cyber resilience slightly easier. But what’s there in the report? Aside from listing NCSC initiatives like Active Cyber Defence and Cyber Essentials, the 100-page document highlights the notion of “resilience engineering”. Although it has its heritage in safety engineering, the concept could be transplanted effectively to the cyber sphere, the NCSC claims, via initiatives like: Infrastructure as code: Allowing organisations to reliably replicate systems for rapid recovery and deploy trusted immutable infrastructure. Immutable backups: Enables effective recovery when there’s total environment loss (including identity, cloud configurations, hypervisors etc). Segmentation: For isolation and containment to minimise impact during an event, or “persistently to create trust boundaries”. Least privilege: Across all services, in order to limit damage and support Zero Trust approaches. Observability and monitoring: To detect anomalies and improve post incident learning. Chaos engineering: The deliberate introduction of failure to validate/test detection and recovery processes. Resilient operations: Includes ensuring availability of crisis response runbooks digitally or physically on isolated platforms or hardcopies. Look to Standards Peter Connolly, CEO at Toro Solutions, argues that best practice standards like ISO 27001 can help organisations to improve their cyber resilience. “It provides a structured framework for managing risk that goes beyond IT to include people, physical security, and business continuity,” he tells ISMS.online. “By taking this integrated approach, organisations can minimise the impact of incidents, maintain critical operations, and demonstrate to customers, investors, and partners that security is a serious priority.” Connolly adds that organisations should use ISO 27001 compliance to help embed security into everyday business culture. “This means making security principles part of routine operations rather than treating them as a separate task,” he concludes. “Start by addressing the most critical risks first, and ensure that cyber, physical, and people-related security are considered together. This approach builds genuine resilience while also providing internationally recognised credibility.” The word “resilience” is mentioned 139 times in the NCSC report. It’s time UK PLC took notice.
ISO 27001

The Spine-Tingling Cyber Incidents Scaring Us This Halloween

The past few years have seen an array of high-profile cyber incidents, from supply chain attacks to zero-day vulnerabilities, ransomware to deepfakes. Threat actors are evolving their attempts to access business networks, steal sensitive data, and defraud organisations. In this Halloween special blog, the IO exec team share the incidents that sent shivers down their spine. Kido Schools - Supply Chain Attack Our CFO, Jon Orpen, says: In September, hackers accessed the data of thousands of children at nursery chain, Kido Schools. They initially gained access to the information via childcare management software, Famly. The attackers published profiles of 20 children online and threatened to publish more unless they were paid in Bitcoin. They also threatened parents directly via phone calls. I have young children and have been through the ‘nursery system’, so this attack really resonated with me. Soon after the threats were made, there was significant public backlash. The attackers removed the posts and claimed to have deleted the information, with the attack being condemned as a ‘new low’ for cybercriminals. However, the attack shows us that cybercriminals are indiscriminate in their attacks, even willing to target children to achieve their aims. The Kido Schools cyberattack is just one of several recent high-profile attacks in which threat actors targeted suppliers to access organisations’ sensitive data. Our State of Information Security Report 2025 found that three in five (61%) of respondents had been impacted by a cybersecurity or information security incident caused by a third-party vendor or supply chain partner and more than a quarter (27%) had been impacted more than once. Reviewing the information security measures that your suppliers have in place is a must in the current threat landscape. Oracle E-Business Suite - Zero-Day Vulnerability Our CPO, Sam Peters, says: Oracle recently patched an E-Business Suite vulnerability, CVE-2025-61884, that may have been used by threat actors to exfiltrate sensitive corporate data from multiple businesses. An update from Oracle described the vulnerability as “remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password. If successfully exploited, this vulnerability may allow access to sensitive resources.” The business stressed that it recommends customers to remain on actively supported versions and apply Security Alerts and Critical Patch Update security patches without delay. While zero-day attacks are unpredictable by nature, businesses can shore up their defences by ensuring software is up to date, patches are installed and by taking a comprehensive approach to risk management. The ISO 27001 standard, for example, provides a framework that supports businesses in building and maintaining a robust information security management system, and bolstering operational resilience in the event of an attack. Implementing the comprehensive, considered incident response and business continuity plans required for ISO 27001 compliance will enable organisations to respond swiftly to zero-day exploit and minimise damage. Marks & Spencer - Supply Chain and Ransomware Attack Our CEO, Chris Newton-Smith, says: An attack on UK retail giant Marks & Spencer (M&S) made headlines in April this year. Threat actors harvested customer data and deployed ransomware that disrupted the company’s IT systems as well as its online and in-store operations, leading to estimated financial losses of £700m. The attackers reportedly used social engineering and targeted an M&S ICT supplier to gain access. They impersonated an M&S employee and convinced the third-party provider to reset an internal user’s password. Upon gaining access to the network, they also harvested sensitive customer data before deploying the ransomware to encrypt M&S systems. The business quickly shut down online ordering systems and suspended contactless payments to prevent further damage being done, reverting physical sales to manual processes. It also involved law enforcement, engaged external cybersecurity experts and communicated the incident and ongoing impact to customers. While some reports criticised the retailer for lacking business continuity plans and incident response plans, it’s clear that M&S took immediate steps to mitigate further risk. This multi-layered attack demonstrates the importance of ongoing third-party risk management for businesses; it also highlights the need for network segmentation to limit the extent of damage that can be done in the event of an attack. Again, ISO 27001 can support organisations here. Compliance and certification to the standard require organisations to assess and implement necessary security controls, including regular backups, information security measures implemented as part of broader business continuity plans, and actionable steps to identify, assess, respond to and manage incidents. Arup - AI Deepfake Our CMO, Dave Holloway, says: This year’s State of Information Security Report shows a decline in deepfake incidents compared to our 2024 report (20% vs 30%) but AI-powered threats are still top of mind for organisations. One notable and extremely sophisticated deepfake attack last year saw engineering business Arup lose $25 million to cybercriminals. It’s reported that an Arup employee was manipulated into making the transaction when perpetrators posed as senior company officers in a hoax video conference. The employee initially suspected they had received a phishing email, as it specified the need for a transaction to be carried out. However, attackers used AI-generated deepfakes to impersonate the officers, which convinced the employee of the call’s legitimacy; they then made the transactions. In an interview with the World Economic Forum, Arup’s CIO, Rob Grieg, described the incident as “technology-enhanced social engineering” and suspects that “this happens more frequently than a lot of people realize.” Combating AI-powered threats represents an ongoing and evolving challenge for businesses. Employee training can ensure staff are aware of red flags to look out for, and role-based access controls ensure only specific employees can access specific networks or confidential information, such as financial information. However, a robust and well-rehearsed incident response plan is still vital to have should an attack be successful. Salesforce - Ransomware Attack Our CRO, Ross Down, says: The attack on CRM provider Salesforce follows a similar pattern to the attack on M&S. Hackers targeted employees and third-party apps to gain access to the company’s networks, reportedly compromising third-party integration, Salesloft Drift, using stolen OAuth tokens to gain unauthorised access. Once they’d gained access, the threat actors were able to export significant amounts of sensitive data, and claim to have stolen nearly a billion records across dozens of Salesforce customers including Fujifilm, Qantas, The Gap, and more. The group demanded a ransom from Salesforce, but it also instructed ransoms from the impacted customers and began leaking victim data online. However, it’s reported that Salesforce refused to pay the ransom, and there’s no evidence that any of the victims paid ransoms, either. Instead, Salesforce has since disabled Drift’s connection to its systems. At the time of writing, the incident is still ongoing, with attackers continuing to threaten to leak further Salesforce customer data. This incident is yet another reminder of the importance of third-party risk management, business continuity planning and incident response planning to reduce and mitigate the impact of an attack. The good news is that organisations are preparing for these eventualities. 80% of respondents to our State of Information Security Report 2025 said they’d adopted improved incident response preparedness and recovery capabilities, while 18% plan to do so in the next 12 months. Risk Management: Proactivity is Key As AI evolves, supply chains grow and the attack surface broadens, cyberattacks like the incidents IO’s exec team have highlighted are only going to increase in both complexity and sophistication. Implementing best practice standards like ISO 27001 for information security management and ISO 42001 for AI management allows organisations to mitigate cyber risk, as well as improving incident identification and response. Ready to act? Our Cyber Hygiene Checklist provides ten best practices businesses can implement to bolster their cyber defences.  
ISO 27001

Heathrow Cyber Incident: Lessons in Resilience and Incident Response

As regulators mandate resilience in business operations, what can others learn from the cyberattack on a supplier that impacted Heathrow and its peers in Europe? In September, a cyberattack on software supplier Collins Aerospace led to long delays at a number of European airports, including London Heathrow. The attack impacted Collins’ Muse passenger processing software, used by airlines to handle online check-in and baggage systems at the airports. At the time, many of the headlines focused on disruption and passenger frustration, yet perhaps the more interesting story is that Heathrow’s operations didn’t grind to a halt. The airport kept functioning, albeit in a degraded mode, thanks to fallback procedures in place before the incident happened. It comes at a time when the risk of cyberattack is surging. There has been a 600% increase in ransomware attacks in the aviation sector in one year, according to Thales. Taking figures such as these into account, governments and regulators are preparing for a future where preventing cyber incidents isn’t possible. It’s far more important that organisations can keep operations running when they do take place. As regulators mandate resilience in business operations, what can others learn from the cyberattack that impacted Heathrow and its peers in Europe? The Line Between Disruption and Disaster The airport’s response helped it to keep going even when under attack. To its credit, Heathrow’s focus was on keeping essential operations moving, even if its core functions slowed down and caused visible disruption, says Becky White, senior solicitor in Harper James' data protection and privacy team. “The priority was maintaining safe travel, rather than preserving a smooth passenger experience,” she tells IO. “By switching to pre-planned manual processes and separating critical systems from those affected, they were able to absorb the shock, rather than collapse under it.” Disaster would have meant a shutdown of air traffic and passenger processing altogether, whereas disruption meant queues, delays and workarounds. Heathrow had “clearly invested in fallback procedures that didn’t rely on perfect conditions”, White points out. “When systems failed, staff knew what ‘good enough to stay open’ looked like, and they acted on it. Learnings for Other Sectors Others should be taking note, especially those operating in critical sectors where downtime is not an option. Beyond aviation, for industries such as healthcare, energy, finance – or retail which has seen its own spate of attacks – the Heathrow example shows how resilience can make all the difference. It is about ensuring critical data can be recovered quickly, systems restored safely, and operations can continue – even when the primary environment is offline, says Anthony Cusimano, director at Object First. “These sectors rely heavily on uninterrupted access to data and operational systems, and even brief outages can have cascading consequences.” Critical industries are increasingly judged on their ability to operate in “degraded mode” rather than avoiding disruption altogether, says White. “Heathrow demonstrated that business continuity doesn’t have to be perfect. It’s about foresight, rehearsal and the ability to prioritise what must keep going.” The Hidden Question Learning from Heathrow’s approach, every board should be questioning how long they could remain operating if their core systems went offline, says Sean Tilley, senior sales director EMEA at 11:11 Systems. Yet he points to an “uncomfortable truth”: Many organisations haven’t fully stress-tested this scenario and business continuity exercises are often “theoretical or siloed”. Most organisations quietly assume they could cope “for a while” without a core system, but very few have tested how long this actually is, says White. “The honest question isn’t whether recovery is possible, but how long the business could function without its key platforms – and what the cost would be to customers, safety or compliance.” Taking this into account, organisations should treat the Heathrow incident as “a case study for resilience planning”, says Ken Prole, executive director of software engineering at Black Duck. He points out that disruption doesn’t only come from cyberattacks: It can also stem from unexpected events such as the CrowdStrike incident that took down systems worldwide in 2024. With the impact of downtime such as this in mind, he highlights questions that should be asked. For example, says Prole: “Have you identified all the critical dependencies in your operations and conducted a thorough threat model? Do you have a documented playbook outlining the actions to take when one or more dependencies are compromised?” Incoming Regulation The need for operational resilience at times of attack is a key part of multiple regulations. In the UK and EU, frameworks such as the network and information systems (NIS2) directive, Digital Operational Resilience Act (DORA) and the UK Cyber Security and Resilience Bill prioritise operational continuity following an incident. “Compliance will increasingly require organisations to demonstrate resilience through metrics, audits, and proof of tested recovery capabilities,” Tilley says. Meanwhile, ISO/IEC 27001 sets a baseline for information security management systems, including documented incident response plans (A.5.29), business continuity considerations (A.5.30), and regular testing of plans. Standards such as this emphasise scenario-based testing under realistic conditions, so organisations can “validate their plans, identify gaps, and build confidence in their ability to respond effectively”, according to Prole. Another useful resource is NIST Cybersecurity Framework (CSF), which includes five core functions to “identify, protect, detect, respond, and recover”. In the UK specifically, the National Cyber Security Centre’s Cyber Assessment Framework (CAF) is a tool for essential services and critical national infrastructure. Board-Level Responsibility Resilience is now a compliance requirement, and for good reason. Prevention remains vital, but the bigger test is how organisations keep going when the worst happens. Heathrow is a real-world reminder that resilience – when tested, rehearsed, and embedded – is as much a compliance requirement as a security safeguard. This is important to consider at board level, where responsibility for resilience as well as security now lies, White points out. She thinks firms must “define what level of downtime is tolerable”, understand their operational dependencies and “ensure investment in realistic continuity planning”. At the same time, regular reviews are needed to adapt to changes in technology, regulation and supply chains, White says. “Resilience should sit alongside financial and legal risk at board level, with clear reporting lines and accountability. The expectation from regulators and stakeholders is that firms can demonstrate readiness, not just intent. If the board only encounters the plan during a real incident, the organisation has already lost control of the narrative.”
ISO 27001

Northwest Nodes: From Happy Customer to Trusted Partner

“The IO platform became our major hub of operations, as all policies and procedures are in one place, and when anything happens, we can update our standards accordingly.”

Zale Reeves Founder, NorthWest Nodes

Learn how Northwest Nodes:

  • Achieved ISO 27001 certification in nine months
  • Used the Assured Results Method to streamline compliance
  • Embedded the IO platform in daily operations to manage information security
  • Joined IO’s trusted partner network to support their customers’ information security success.

NorthWest Nodes is a blockchain infrastructure provider, providing a range of solutions for businesses in the Web3 space, including Chainlink oracle node hosting, RPC nodes, and consulting services. The business builds innovative, secure, and scalable technology solutions for the future of digital infrastructure.

NorthWest Nodes supports over 70 blockchains and various protocols, with a focus on institutional clients. As part of a highly regulated industry, Northwest Nodes required ISO 27001 certification to comply with legal requirements. Certification also promised reputational benefits: it would build trust with customers, prospects, and other stakeholders. The team knew that ISO 27001 certification would demonstrate the business’s comprehensive, dedicated approach to safeguarding sensitive information.

However, NorthWest Nodes lacked a comprehensive framework for ISO 27001 implementation. The business had implemented some information security measures but lacked the tracking and tooling needed to manage them effectively. Zale and the team managed information security using disparate internal documentation rather than in a centralised platform. They knew that leveraging a consolidated platform would be key to streamlining their certification.

NorthWest Nodes engaged the IO platform to support their ISO 27001 certification journey. Zale and his team used the ISO 27001 tips, guidance and support included in the 11-step Assured Results Method to streamline compliance, which enabled them to work through requirements strategically and take the process step-by-step as each stage was completed.

“The IO platform was fantastic; we were able to start from step one and work our way through diligently over time.”

Zale Reeves Founder, NorthWest Nodes

The team found the platform’s risk management system particularly useful, enabling them to assess, manage, and view organisational risks in a clear, comprehensive risk tool. The tool was supplied pre-filled with suggested risks the team could choose from, as well as offering a function for them to input their own, organisation-specific risks.

Northwest Nodes successfully achieved ISO 27001 certification in just nine months; Zale estimates that the platform saved the business a year or more in implementation time. The business has now embedded the IO platform as a key element of daily operations, ensuring information security is maintained and continuously improved in line with the ISO 27001 standard’s requirements.

“The IO platform became our major hub of operations, as all policies and procedures are in one place, and when anything happens, we can update our standards accordingly.”

Zale Reeves Founder, NorthWest Nodes

Zale credits IO’s pre-built ISO 27001 framework and the expertise of our consultants as adding the most value to Northwest Nodes’ certification journey, praising the team’s availability and helpfulness.

“Staff were available all the time and they facilitated our internal and external audits, so we knew we were getting end-to-end support.”

Zale Reeves Founder, NorthWest Nodes

In addition, the business is already unlocking significant value from its ISO 27001 certification:

“Our opportunities have increased massively thanks to this certificate.”

Zale Reeves Founder, NorthWest Nodes

“It is truly a pleasure to work with the team, and it is a no brainer to use IO for all certification standards.”

Zale Reeves Founder, NorthWest Nodes

The team are planning to tackle SOC 2 certification next. Northwest Nodes has also expanded its relationship with IO, and recently become one of IO’s trusted partners. Now, Zale and his team are supporting their own clients as they work to achieve compliance and certification to standards like ISO 27001, SOC 2, ISO 42001 and more.

“IO’s platform and support was so fantastic, and we knew there would be a need for other companies like ours to get compliant. It was an obvious choice to help people get certified.”

Zale Reeves Founder, NorthWest Nodes

Zale shares what he considers to be the biggest benefit for organisations that adopt IO: “Knowing that you have the framework available so nothing is missed, being able to add notes and discussions to all facets of the ISMS, and having the support needed to make a plan and stick to it are all massive benefits on their own.”

“Having it all in one place takes months off the process, and ensures you are audit ready.”

Zale Reeves Founder, NorthWest Nodes

He explains that, when it comes to referring clients, it’s the simplicity and affordability of the IO platform that makes it stand out to him compared to other platforms.

“You know your business better than anyone else and it should be you who does the work to get your ISMS ready. Many companies add a lot of bells and whistles that are unnecessary and costly.”

Zale Reeves Founder, NorthWest Nodes

ISO 27001

How TouchPoints.health uses ISO 27001 certification to enable business growth

“For a healthcare company like ours, trust is everything. Having a partner like IO has been essential in turning compliance from a challenge into an enabler of growth.”

Alex Almoudaris CEO and Founder, TouchPoints.health

Learn how TouchPoints.health:

  • Achieved ISO 27001 certification in six months
  • Used the Assured Results Method to streamline and consolidate compliance
  • Embedded compliance in daily workflows and across the organisation
  • Ensures ongoing employee information security engagement and awareness with dedicated training.

TouchPoints.health is a secure, cloud-based practice management platform designed specifically for UK private doctors and clinics. The business enables clinicians to run their entire service from one user-friendly platform with emphasis on human-centred design and security.

Their mission is to transform the private healthcare experience for both doctors and patients by combining usability with robust compliance and security.

TouchPoints.health is built exclusively for clinicians and their patients; as such, sensitive health data is stored within the platform and robust, secure data management practices are crucial. The team knew that ISO 27001 certification was key to building trust in the platform and demonstrating that the business securely manages sensitive data.

“An important priority was demonstrating to clinicians, patients, and partners that our platform is both safe and effective. Trust in how we manage sensitive health data is fundamental to adoption.”

Alex Almoudaris CEO and Founder, TouchPoints.health

Alex and his team managed the organisation’s information security compliance using an array of SharePoint documents, spreadsheets, and internal checklists. While this approach was workable, it was not scalable with company growth.

As part of achieving ISO 27001 certification, the TouchPoints.health team knew that the business needed to scale from disparate policies and procedures to a fully structured, audit-ready information security management system (ISMS) that was clear, dynamic, and embedded into daily operations. To do so, they required a comprehensive, centralised approach to compliance and a solution that would support their ISO 27001 certification journey.

“As a small but growing team, we needed a solution that could guide us through best practice while minimising administrative burden.”

Alex Almoudaris CEO and Founder, TouchPoints.health

TouchPoints.health adopted the IO platform to support their ISO 27001 compliance and certification journey, using our 11-step Assured Results Method (ARM) to streamline and support their progress.

“The platform provides a structured pathway with practical guidance, which helped us accelerate our readiness. The [IO platform’s] usability stood out compared to traditional document-heavy systems.”

Alex Almoudaris CEO and Founder, TouchPoints.health

In addition, Alex and his team used the platform’s ISO 27001 framework to support their compliance and certification. The ISO 27001 module comes with policy and control templates that businesses can adapt to their specific industry and requirements, complete with intuitive task management capabilities, a risk bank and an evidence library.

“The pre-mapped ISO 27001 framework, dynamic policies and controls, and collaborative task management were invaluable. The audit-ready evidence library also gave us confidence in preparing for external assessments.”

Alex Almoudaris CEO and Founder, TouchPoints.health

Using the IO platform and pre-loaded ISO 27001 framework, the dedicated TouchPoints.health team accelerated their ISO 27001 certification journey.

“We estimate IO has saved us at least 30–40% of the time compared with trying to build and maintain our ISMS manually, particularly when it comes to mapping controls and gathering evidence.”

Alex Almoudaris CEO and Founder, TouchPoints.health

Impressively, TouchPoints.health achieved UKAS-accredited ISO 27001 certification in just six months, with zero non-conformities. This is largely due to the commitment of the TouchPoints.health team. Alex described how using IO enabled the team to embed compliance in daily workflows and across the organisation: “Instead of compliance being a side task, it is now part of how we operate.”

“The most valuable element has been the clear framework and guidance that removes ambiguity and the excellent support offered whenever needed. This has accelerated our progress while ensuring we remain aligned with best practice.”

Alex Almoudaris CEO and Founder, TouchPoints.health

Employee information security awareness is vital for ongoing ISO 27001 compliance, as well as specifically within the healthcare sector, which is highly targeted by threat actors. IO’s employee training features were an area where Alex said the platform provided unexpected support:

“An unexpected benefit has been how the platform supports team engagement and training. The structured approach means security is now part of everyday conversations, not just a compliance project.”

Alex Almoudaris CEO and Founder, TouchPoints.health

Alex also praised the support provided by the IO team.

“The team has been a pleasure to work with. They have been supportive, knowledgeable, and responsive. Their expertise in navigating ISO 27001 has been instrumental in helping us move forward with confidence.”

Alex Almoudaris CEO and Founder, TouchPoints.health

The TouchPoints.health team aren’t resting on their laurels when it comes to compliance, but they do have one key next step to take!

“Our immediate next step is finding a place to hang our certificate!”

Alex Almoudaris CEO and Founder, TouchPoints.health

ISO 27001:2022 Annex A Controls

Organisational Controls

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

Ready to get started?