Skip to content

Achieve Robust Information Security with ISO 27001:2022

Our platform empowers your organisation to align with ISO 27001, ensuring comprehensive security management. This international standard is essential for protecting sensitive data and enhancing resilience against cyber threats. With over 70,000 certificates issued globally, ISO 27001’s widespread adoption underscores its importance in safeguarding information assets.

Why ISO 27001 Matters

Achieving ISO 27001:2022 certification emphasises a comprehensive, risk-based approach to improving information security management, ensuring your organisation effectively manages and mitigates potential threats, aligning with modern security needs. It provides a systematic methodology for managing sensitive information, ensuring it remains secure. Certification can reduce data breach costs by 30% and is recognised in over 150 countries, enhancing international business opportunities and competitive advantage.

How ISO 27001 Certification Benefits Your Business

  1. Achieve Cost Efficiency: Save time and money by preventing costly security breaches. Implement proactive risk management measures to significantly reduce the likelihood of incidents.
  2. Accelerate Sales Growth: Streamline your sales process by reducing extensive security documentation requests (RFIs). Showcase your compliance with international information security standards to shorten negotiation times and close deals faster.
  3. Boost Client Trust: Demonstrate your commitment to information security to enhance client confidence and build lasting trust. Increase customer loyalty and retain clients in sectors like finance, healthcare, and IT services.

 

Comprehensive Guide on How to Implement ISO 27001:2022 Certification

The standard’s structure includes a comprehensive Information Security Management System (ISMS) framework and a detailed ISO 27001 implementation guide that integrates risk management processes and Annex A controls. These components create a holistic security strategy, addressing various aspects of security (ISO 27001:2022 Clause 4.2). This approach not only enhances security but also fosters a culture of awareness and compliance within the organisation.

Streamlining Certification with ISMS.online

ISMS.online plays a crucial role in facilitating alignment by offering tools that streamline the certification process. Our platform provides automated risk assessments and real-time monitoring, simplifying the implementation of ISO 27001:2022 requirements. This not only reduces manual effort but also enhances efficiency and accuracy in maintaining alignment.

Join 25000 + Users Achieving ISO 27001 with ISMS.online. Book Your Free Demo Today!


Understanding ISO 27001:2022

ISO 27001 is a pivotal standard for improving an Information Security Management System (ISMS), offering a structured framework to protect sensitive data. This framework integrates comprehensive risk evaluation processes and Annex A controls, forming a robust security strategy. Organisations can effectively identify, analyse, and address vulnerabilities, enhancing their overall security posture.

Key Elements of ISO 27001:2022

  • ISMS Framework: This foundational component establishes systematic policies and procedures for managing information security (ISO 27001:2022 Clause 4.2). It aligns organisational goals with security protocols, fostering a culture of compliance and awareness.
  • Risk Evaluation: Central to ISO 27001, this process involves conducting thorough assessments to identify potential threats. It is essential for implementing appropriate security measures and ensuring continuous monitoring and improvement.
  • ISO 27001 Controls: ISO 27001:2022 outlines a comprehensive set of ISO 27001 controls within Annex A, designed to address various aspects of information security. These controls include measures for access control, cryptography, physical security, and incident management, among others. Implementing these controls ensures your Information Security Management System (ISMS) effectively mitigates risks and safeguards sensitive information.

iso 27001 requirements and structure

Aligning with International Standards

ISO 27001:2022 is developed in collaboration with the International Electrotechnical Commission (IEC), ensuring that the standard aligns with global best practices in information security. This partnership enhances the credibility and applicability of ISO 27001 across diverse industries and regions.

How ISO 27001 Integrates with Other Standards

ISO 27001:2022 seamlessly integrates with other standards like ISO 9001 for quality management, ISO 27002 for code of practice for information security controls and regulations like GDPR, enhancing compliance and operational efficiency. This integration allows organisations to streamline regulatory efforts and align security practices with broader business objectives. Initial preparation involves a gap analysis to identify areas needing improvement, followed by a risk evaluation to assess potential threats. Implementing Annex A controls ensures comprehensive security measures are in place. The final audit process, including Stage 1 and Stage 2 audits, verifies compliance and readiness for certification.

Why Is ISO 27001:2022 Important for Organisations?

ISO 27001 plays a vital role in strengthening your organisation’s data protection strategies. It provides a comprehensive framework for managing sensitive information, aligning with contemporary cybersecurity requirements through a risk-based approach. This alignment not only fortifies defences but also ensures adherence to regulations like GDPR, mitigating potential legal risks (ISO 27001:2022 Clause 6.1).

ISO 27001:2022 Integration with Other Standards

ISO 27001 is part of the broader ISO family of management system standards. This allows it to be seamlessly integrated with other standards, such as:

This integrated approach helps your organisation maintain robust operational standards, streamlining the certification process and enhancing compliance.

How Does ISO 27001:2022 Enhance Risk Management?

  • Structured Risk Management: The standard emphasises the systematic identification, assessment, and mitigation of risks, fostering a proactive security posture.
  • Incident Reduction: Organisations experience fewer breaches due to the robust controls outlined in Annex A.
  • Operational Efficiency: Streamlined processes enhance efficiency, reducing the likelihood of costly incidents.

Structured Risk Management with ISO 27001:2022

ISO 27001 requires organisations to adopt a comprehensive, systematic approach to risk management. This includes:

  • Risk Identification and Assessment: Identify potential threats to sensitive data and evaluate the severity and likelihood of those risks (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Select appropriate treatment options, such as mitigating, transferring, avoiding, or accepting risks. With the addition of new options like exploiting and enhancing, organisations can take calculated risks to harness opportunities.

Each of these steps must be reviewed regularly to ensure that the risk landscape is continuously monitored and mitigated as necessary.

 

What Are the Benefits for Trust and Reputation?

Certification signifies a commitment to data protection, enhancing your business reputation and customer trust. Certified organisations often see a 20% increase in customer satisfaction, as clients appreciate the assurance of secure data handling.

How ISO 27001 Certification Impacts Client Trust and Sales

  1. Increased Client Confidence: When prospective clients see that your organisation is ISO 27001 certified, it automatically elevates their trust in your ability to protect sensitive information. This trust is essential for sectors where data security is a deciding factor, such as healthcare, finance, and government contracting.
  2. Faster Sales Cycles: ISO 27001 certification reduces the time spent answering security questionnaires during the procurement process. Prospective clients will see your certification as a guarantee of high security standards, speeding up decision-making.
  3. Competitive Advantage: ISO 27001 certification positions your company as a leader in information security, giving you an edge over competitors who may not hold this certification.

How Does ISO 27001:2022 Offer Competitive Advantages?

ISO 27001 opens international business opportunities, recognised in over 150 countries. It cultivates a culture of security awareness, positively influencing organisational culture and encouraging continuous improvement and resilience, essential for thriving in today’s digital environment.

How Can ISO 27001 Support Regulatory Adherence?

Aligning with ISO 27001 helps navigate complex regulatory landscapes, ensuring adherence to various legal requirements. This alignment reduces potential legal liabilities and enhances overall governance.

Incorporating ISO 27001:2022 into your organisation not only strengthens your data protection framework but also builds a foundation for sustainable growth and trust in the global market.


Enhancing Risk Management with ISO 27001:2022

ISO 27001:2022 offers a robust framework for managing information security risks, vital for safeguarding your organisation’s sensitive data. This standard emphasises a systematic approach to risk evaluation, ensuring potential threats are identified, assessed, and mitigated effectively.

How Does ISO 27001 Structure Risk Management?

ISO 27001:2022 integrates risk evaluation into the Information Security Management System (ISMS), involving:

  • Risk Assessment: Conducting thorough evaluations to identify and analyse potential threats and vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Implementing strategies to mitigate identified risks, using controls outlined in Annex A to reduce vulnerabilities and threats.
  • Continuous Monitoring: Regularly reviewing and updating practices to adapt to evolving threats and maintain security effectiveness.

What Techniques and Strategies Are Key?

Effective risk management under ISO 27001:2022 involves:

  • Risk Assessment and Analysis: Utilising methodologies like SWOT analysis and threat modelling to evaluate risks comprehensively.
  • Risk Treatment and Mitigation: Applying controls from Annex A to address specific risks, ensuring a proactive approach to security.
  • Continuous Improvement: Fostering a security-focused culture that encourages ongoing evaluation and enhancement of risk management practices.

 

How Can the Framework Be Tailored to Your Organisation?

ISO 27001:2022’s framework can be customised to fit your organisation’s specific needs, ensuring that security measures align with business objectives and regulatory requirements. By fostering a culture of proactive risk management, organisations with ISO 27001 certification experience fewer security breaches and enhanced resilience against cyber threats. This approach not only protects your data but also builds trust with stakeholders, enhancing your organisation’s reputation and competitive edge.

Key Changes in ISO 27001:2022

ISO 27001:2022 introduces pivotal updates, enhancing its role in modern cybersecurity. The most significant changes reside in Annex A, which now includes advanced measures for digital security and proactive threat management. These revisions address the evolving nature of security challenges, particularly the increasing reliance on digital platforms.

Key Differences Between ISO 27001:2022 and Earlier Versions

The differences between the 2013 and 2022 versions of ISO 27001 are crucial to understanding the updated standard. While there are no massive overhauls, the refinements in Annex A controls and other areas ensure the standard remains relevant to modern cybersecurity challenges. Key changes include:

  • Restructuring of Annex A Controls: Annex A controls have been condensed from 114 to 93, with some being merged, revised, or newly added. These changes reflect the current cybersecurity environment, making controls more streamlined and focused.
  • New Focus Areas: The 11 new controls introduced in ISO 27001:2022 include areas such as threat intelligence, physical security monitoring, secure coding, and cloud service security, addressing the rise of digital threats and the increased reliance on cloud-based solutions.

Understanding Annex A Controls

  • Enhanced Security Protocols: Annex A now features 93 controls, with new additions focusing on digital security and proactive threat management. These controls are designed to mitigate emerging risks and ensure robust protection of information assets.
  • Digital Security Focus: As digital platforms become integral to operations, ISO 27001:2022 emphasises securing digital environments, ensuring data integrity, and safeguarding against unauthorised access.
  • Proactive Threat Management: New controls enable organisations to anticipate and respond to potential security incidents more effectively, strengthening their overall security posture.

Detailed Breakdown of Annex A Controls in ISO 27001:2022

ISO 27001:2022 introduces a revised set of Annex A controls, reducing the total from 114 to 93 and restructuring them into four main groups. Here’s a breakdown of the control categories:

Control Group Number of Controls Examples
Organisational 37 Threat intelligence, ICT readiness, information security policies
People 8 Responsibilities for security, screening
Physical 14 Physical security monitoring, equipment protection
Technological 34 Web filtering, secure coding, data leakage prevention

New Controls
ISO 27001:2022 introduces 11 new controls focused on emerging technologies and challenges, including:

  • Cloud services: Security measures for cloud infrastructure.
  • Threat intelligence: Proactive identification of security threats.
  • ICT readiness: Business continuity preparations for ICT systems.

By implementing these controls, organisations ensure they are equipped to handle modern information security challenges.

iso 27002 new controls

Full Table of ISO 27001 Controls

Below is a full list of ISO 27001:2022 controls

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

Navigating Implementation Challenges

Organisations may face challenges such as resource constraints and insufficient management support when implementing these updates. Effective resource allocation and stakeholder engagement are crucial for maintaining momentum and achieving successful compliance. Regular training sessions can help clarify the standard’s requirements, reducing compliance challenges.

Adapting to Evolving Security Threats

These updates demonstrate ISO 27001:2022’s adaptability to the changing security environment, ensuring organisations remain resilient against new threats. By aligning with these enhanced requirements, your organisation can bolster its security framework, improve compliance processes, and maintain a competitive edge in the global market.


How Can Organisations Successfully Attain ISO 27001 Certification?

Achieving ISO 27001:2022 requires a methodical approach, ensuring your organisation aligns with the standard’s comprehensive requirements. Here’s a detailed guide to navigate this process effectively:

Kickstart Your Certification with a Thorough Gap Analysis

Identify improvement areas with a comprehensive gap analysis. Assess current practices against ISO 27001 standard to pinpoint discrepancies. Develop a detailed project plan outlining objectives, timelines, and responsibilities. Engage stakeholders early to secure buy-in and allocate resources efficiently.

Implement an Effective ISMS

Establish and implement an Information Security Management System (ISMS) tailored to your organisational goals. Implement the 93 Annex A controls, emphasising risk assessment and treatment (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and enhancing precision.

Perform Regular Internal Audits

Conduct regular internal audits to evaluate the effectiveness of your ISMS. Management reviews are essential for performance evaluation and necessary adjustments (ISO 27001:2022 Clause 9.3). ISMS.online facilitates real-time collaboration, boosting team efficiency and audit readiness.

Engage with Certification Bodies

Select an accredited certification body and schedule the audit process, including Stage 1 and Stage 2 audits. Ensure all documentation is complete and accessible. ISMS.online offers templates and resources to simplify documentation and track progress.

Overcome Common Challenges with a Free Consultation

Overcome resource constraints and resistance to change by fostering a culture of security awareness and continuous improvement. Our platform supports maintaining alignment over time, aiding your organisation in achieving and sustaining certification.

Schedule a free consultation to address resource constraints and navigate resistance to change. Learn how ISMS.online can support your implementation efforts and ensure successful certification.

ISO 27001:2022 and Supplier Relationships Requirements

ISO 27001:2022 has introduced new requirements to ensure organisations maintain robust supplier and third-party management programs. This includes:

  • Identifying and Assessing Suppliers: Organisations must identify and analyse third-party suppliers that impact information security. A thorough risk assessment for each supplier is mandatory to ensure compliance with your ISMS.
  • Supplier Security Controls: Ensure that your suppliers implement adequate security controls and that these are regularly reviewed. This extends to ensuring that customer service levels and personal data protection are not adversely affected.
  • Auditing Suppliers: Organisations should audit their suppliers’ processes and systems regularly. This aligns with the new ISO 27001:2022 requirements, ensuring that supplier compliance is maintained and that risks from third-party partnerships are mitigated.

 

Enhanced Employee Cybersecurity Awareness

ISO 27001:2022 continues to emphasise the importance of employee awareness. Implementing policies for ongoing education and training is critical. This approach ensures that your employees are not only aware of security risks but are also capable of actively participating in mitigating those risks.

  • Human Error Prevention: Businesses should invest in training programs that aim to prevent human error, one of the leading causes of security breaches.
  • Clear Policy Development: Establish clear guidelines for employee conduct regarding data security. This includes awareness programs on phishing, password management, and mobile device security.
  • Security Culture: Foster a security-aware culture where employees feel empowered to raise concerns about cybersecurity threats. An environment of openness helps organisations tackle risks before they materialise into incidents.

ISO 27001:2022 Requirements for Human Resource Security

One of the essential refinements in ISO 27001:2022 is its expanded focus on human resource security. This involves:

  • Personnel Screening: Clear guidelines for personnel screening before hiring are crucial to ensuring that employees with access to sensitive information meet required security standards.
  • Training and Awareness: Ongoing education is required to ensure that staff are fully aware of the organisation’s security policies and procedures.
  • Disciplinary Actions: Define clear consequences for policy violations, ensuring that all employees understand the importance of complying with security requirements.

These controls ensure that organisations manage both internal and external personnel security risks effectively.


Employee Awareness Programs and Security Culture

Fostering a culture of security awareness is crucial for maintaining strong defences against evolving cyber threats. ISO 27001:2022 promotes ongoing training and awareness programs to ensure that all employees, from leadership to staff, are involved in upholding information security standards.

  • Phishing Simulations and Security Drills: Conducting regular security drills and phishing simulations helps ensure employees are prepared to handle cyber incidents.
  • Interactive Workshops: Engage employees in practical training sessions that reinforce key security protocols, improving overall organisational awareness.

Continual Improvement and Cybersecurity Culture

Finally, ISO 27001:2022 advocates for a culture of continual improvement, where organisations consistently evaluate and update their security policies. This proactive stance is integral to maintaining compliance and ensuring the organisation stays ahead of emerging threats.

  • Security Governance: Regular updates to security policies and audits of cybersecurity practices ensure ongoing compliance with ISO 27001:2022.
  • Proactive Risk Management: Encouraging a culture that prioritises risk assessment and mitigation allows organisations to stay responsive to new cyber threats.

Optimal Timing for ISO 27001 Adoption

Adopting ISO 27001:2022 is a strategic decision that depends on your organisation’s readiness and objectives. The ideal timing often aligns with periods of growth or digital transformation, where enhancing security frameworks can significantly improve business outcomes. Early adoption provides a competitive edge, as certification is recognised in over 150 countries, expanding international business opportunities.

Conducting a Readiness Assessment

To ensure a seamless adoption, conduct a thorough readiness assessment to evaluate current security practices against the updated standard. This involves:

  • Gap Analysis: Identify areas needing improvement and align them with ISO 27001:2022 requirements.
  • Resource Allocation: Ensure adequate resources, including personnel, technology, and budget, are available to support the adoption.
  • Stakeholder Engagement: Secure buy-in from key stakeholders to facilitate a smooth adoption process.

Aligning Certification with Strategic Goals

Aligning certification with strategic goals enhances business outcomes. Consider:

  • Timeline and Deadlines: Be aware of industry-specific deadlines for compliance to avoid penalties.
  • Continuous Improvement: Foster a culture of ongoing evaluation and enhancement of security practices.

 

Utilising ISMS.online for Effective Management

Our platform, ISMS.online, plays a vital role in managing the adoption effectively. It offers tools for automating compliance tasks, reducing manual effort, and providing real-time collaboration features. This ensures your organisation can maintain compliance and track progress efficiently throughout the adoption process.

By strategically planning and utilising the right tools, your organisation can navigate the adoption of ISO 27001:2022 smoothly, ensuring robust security and compliance.

Where Does ISO 27001:2022 Align with Other Regulatory Standards?

ISO 27001 plays a significant role in aligning with key regulatory frameworks, such as GDPR and NIS 2, to enhance data protection and streamline regulatory adherence. This alignment not only strengthens data privacy but also improves organisational resilience across multiple frameworks.

How Does ISO 27001:2022 Enhance GDPR Compliance?

ISO 27001:2022 complements GDPR by focusing on data protection and privacy through its comprehensive risk management processes (ISO 27001:2022 Clause 6.1). The standard’s emphasis on safeguarding personal data aligns with GDPR’s stringent requirements, ensuring robust data protection strategies.

What Role Does ISO 27001:2022 Play in Supporting NIS 2 Directives?

The standard supports NIS 2 directives by enhancing cybersecurity resilience. ISO 27001:2022’s focus on threat intelligence and incident response aligns with NIS 2’s objectives, fortifying organisations against cyber threats and ensuring continuity of critical services.

How Does ISO 27001:2022 Integrate with Other ISO Standards?

ISO 27001 integrates effectively with other ISO standards, such as ISO 9001 and ISO 14001, creating synergies that enhance overall regulatory alignment and operational efficiency. This integration facilitates a unified approach to managing quality, environmental, and security standards within an organisation.

How Can Organisations Achieve Comprehensive Regulatory Alignment with ISO 27001:2022?

Organisations can achieve comprehensive regulatory alignment by synchronising their security practices with broader requirements. Our platform, ISMS.online, offers extensive certification support, providing tools and resources to simplify the process. Industry associations and webinars further enhance understanding and implementation, ensuring organisations remain compliant and competitive.

Can ISO 27001:2022 Effectively Mitigate New Security Challenges?

Emerging threats, including cyber-attacks and data breaches, necessitate robust strategies. ISO 27001:2022 offers a comprehensive framework for managing risks, emphasising a risk-based approach to identify, assess, and mitigate potential threats.

How Does ISO 27001:2022 Enhance Cyber Threat Mitigation?

ISO 27001:2022 strengthens mitigation through structured risk management processes. By implementing Annex A controls, organisations can proactively address vulnerabilities, reducing cyber incidents. This proactive stance builds trust with clients and partners, differentiating businesses in the market.

What Measures Ensure Cloud Security with ISO 27001:2022?

Cloud security challenges are prevalent as organisations migrate to digital platforms. ISO 27001:2022 includes specific controls for cloud environments, ensuring data integrity and safeguarding against unauthorised access. These measures foster customer loyalty and enhance market share.

How Does ISO 27001:2022 Prevent Data Breaches?

Data breaches pose significant risks, impacting reputation and financial stability. ISO 27001:2022 establishes comprehensive protocols, ensuring continuous monitoring and improvement. Certified organisations often experience fewer breaches, maintaining effective security measures.

How Can Organisations Adapt to Evolving Threat Landscapes?

Organisations can adapt ISO 27001:2022 to evolving threats by regularly updating security practices. This adaptability ensures alignment with emerging threats, maintaining robust defences. By demonstrating a commitment to security, certified organisations gain a competitive edge and are preferred by clients and partners.

Cultivating a Security Culture with ISO 27001 Compliance

ISO 27001 serves as a cornerstone in developing a robust security culture by emphasising awareness and comprehensive training. This approach not only fortifies your organisation’s security posture but also aligns with current cybersecurity standards.

How to Enhance Security Awareness and Training

Security awareness is integral to ISO 27001:2022, ensuring your employees understand their roles in protecting information assets. Tailored training programmes empower staff to recognise and respond to threats effectively, minimising incident risks.

What Are Effective Training Strategies?

Organisations can enhance training by:

  • Interactive Workshops: Conduct engaging sessions that reinforce security protocols.
  • E-Learning Modules: Provide flexible online courses for continuous learning.
  • Simulated Exercises: Implement phishing simulations and incident response drills to test readiness.

 

How Does Leadership Influence Security Culture?

Leadership plays a pivotal role in embedding a security-focused culture. By prioritising security initiatives and leading by example, management instils responsibility and vigilance throughout the organisation, making security integral to the organisational ethos.

What Are the Long-Term Benefits of Security Awareness?

ISO 27001:2022 offers sustained improvements and risk reduction, enhancing credibility and providing a competitive edge. Organisations report increased operational efficiency and reduced costs, supporting growth and opening new opportunities.

How Does ISMS.online Support Your Security Culture?

Our platform, ISMS.online, aids organisations by offering tools for tracking training progress and facilitating real-time collaboration. This ensures that security awareness is maintained and continuously improved, aligning with ISO 27001:2022’s objectives.


Navigating Challenges in ISO 27001:2022 Implementation

Implementing ISO 27001:2022 involves overcoming significant challenges, such as managing limited resources and addressing resistance to change. These hurdles must be addressed to achieve certification and enhance your organisation’s information security posture.

Identifying Common Implementation Hurdles

Organisations often face difficulties in allocating adequate resources, both financial and human, to meet ISO 27001:2022’s comprehensive requirements. Resistance to adopting new security practices can also impede progress, as employees may be hesitant to alter established workflows.

Efficient Resource Management Strategies

To optimise resource management, prioritise tasks based on risk assessment outcomes, focusing on high-impact areas (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and ensuring critical areas receive the necessary attention.

Overcoming Resistance to Change

Effective communication and training are key to mitigating resistance. Engage employees in the implementation process by highlighting the benefits of ISO 27001:2022, such as enhanced data protection and GDPR alignment. Regular training sessions can foster a culture of security awareness and compliance.

Enhancing Implementation with ISMS.online

ISMS.online plays a pivotal role in overcoming these challenges by providing tools that enhance collaboration and streamline documentation. Our platform supports integrated compliance strategies, aligning ISO 27001 with standards like ISO 9001, thereby improving overall efficiency and regulatory adherence. By simplifying the implementation process, ISMS.online helps your organisation achieve and maintain ISO 27001:2022 certification effectively.

What are the key differences between ISO 27001:2022 and earlier versions?

ISO 27001:2022 introduces pivotal updates to meet evolving security demands, enhancing its relevance in today’s digital environment. A significant change is the expansion of Annex A controls, now totaling 93, which include new measures for cloud security and threat intelligence. These additions underscore the growing importance of digital ecosystems and proactive threat management.

Impact on Compliance and Certification
The updates in ISO 27001:2022 require adjustments in compliance processes. Your organisation must integrate these new controls into its Information Security Management Systems (ISMS), ensuring alignment with the latest requirements (ISO 27001:2022 Clause 6.1). This integration streamlines certification by providing a comprehensive framework for managing information risks.

New Controls and Their Significance
The introduction of controls focused on cloud security and threat intelligence is noteworthy. These controls help your organisation protect data in complex digital environments, addressing vulnerabilities unique to cloud systems. By implementing these measures, you can enhance your security posture and reduce the risk of data breaches.

Adapting to New Requirements
To adapt to these changes, your organisation should conduct a thorough gap analysis to identify areas needing improvement. This involves assessing current practices against the updated standard, ensuring alignment with new controls. By using platforms like ISMS.online, you can automate compliance tasks, reducing manual effort and enhancing efficiency.

These updates highlight ISO 27001:2022’s commitment to addressing contemporary security challenges, ensuring your organisation remains resilient against emerging threats.

Why should Compliance Officers prioritise ISO 27001:2022?

ISO 27001:2022 is pivotal for compliance officers seeking to enhance their organisation’s information security framework. Its structured methodology for regulatory adherence and risk management is indispensable in today’s interconnected environment.

Navigating Regulatory Frameworks
ISO 27001:2022 aligns with global standards like GDPR, providing a comprehensive framework that ensures data protection and privacy. By adhering to its guidelines, you can confidently navigate complex regulatory landscapes, reducing legal risks and enhancing governance (ISO 27001:2022 Clause 6.1).

Proactive Risk Management
The standard’s risk-based approach enables organisations to systematically identify, assess, and mitigate risks. This proactive stance minimises vulnerabilities and fosters a culture of continuous improvement, essential for maintaining a robust security posture. Compliance officers can utilise ISO 27001:2022 to implement effective risk treatment strategies, ensuring resilience against emerging threats.

Enhancing Organisational Security
ISO 27001:2022 significantly enhances your organisation’s security posture by embedding security practices into core business processes. This integration boosts operational efficiency and builds trust with stakeholders, positioning your organisation as a leader in information security.

Effective Implementation Strategies
Compliance officers can implement ISO 27001:2022 effectively by utilising platforms like ISMS.online, which streamline efforts through automated risk assessments and real-time monitoring. Engaging stakeholders and fostering a security-aware culture are crucial steps in embedding the standard’s principles across your organisation.

By prioritising ISO 27001:2022, you not only safeguard your organisation’s data but also drive strategic advantages in a competitive market.

How does ISO 27001:2022 enhance security frameworks?

ISO 27001:2022 establishes a comprehensive framework for managing information security, focusing on a risk-based approach. This approach allows your organisation to systematically identify, assess, and address potential threats, ensuring robust protection of sensitive data and adherence to international standards.

Key Strategies for Threat Mitigation

  • Conducting Risk Assessments: Thorough evaluations identify vulnerabilities and potential threats (ISO 27001:2022 Clause 6.1), forming the basis for targeted security measures.
  • Implementing Security Controls: Annex A controls are utilised to address specific risks, ensuring a holistic approach to threat prevention.
  • Continuous Monitoring: Regular reviews of security practices allow adaptation to evolving threats, maintaining the effectiveness of your security posture.

Data Protection and Privacy Alignment
ISO 27001:2022 integrates security practices into organisational processes, aligning with regulations like GDPR. This ensures that personal data is handled securely, reducing legal risks and enhancing stakeholder trust.

Building a Proactive Security Culture
By fostering security awareness, ISO 27001:2022 promotes continuous improvement and vigilance. This proactive stance minimises vulnerabilities and strengthens your organisation’s overall security posture. Our platform, ISMS.online, supports these efforts with tools for real-time monitoring and automated risk assessments, positioning your organisation as a leader in information security.

Incorporating ISO 27001:2022 into your security strategy not only fortifies defences but also enhances your organisation’s reputation and competitive advantage.

What advantages does ISO 27001:2022 offer to CEOs?

ISO 27001:2022 is a strategic asset for CEOs, enhancing organisational resilience and operational efficiency through a risk-based methodology. This standard aligns security protocols with business objectives, ensuring robust information security management.

How does ISO 27001:2022 enhance strategic business integration?

Risk Management Framework:
ISO 27001:2022 provides a comprehensive framework for identifying and mitigating risks, safeguarding your assets, and ensuring business continuity.

Regulatory Compliance Standards:
By aligning with global standards like GDPR, it minimises legal risks and strengthens governance, essential for maintaining market trust.

What are the competitive advantages of ISO 27001:2022?

Reputation Enhancement:
Certification demonstrates a commitment to security, boosting customer trust and satisfaction. Organisations often report increased client confidence, leading to higher retention rates.

Global Market Access:
With acceptance in over 150 countries, ISO 27001:2022 facilitates entry into international markets, offering a competitive edge.

How can ISO 27001:2022 drive business growth?

Operational Efficiency:
Streamlined processes reduce security incidents, lowering costs and improving efficiency.

Innovation and Digital Transformation:
By fostering a culture of security awareness, it supports digital transformation and innovation, driving business growth.

Integrating ISO 27001:2022 into your strategic planning aligns security measures with organisational goals, ensuring they support broader business objectives. Our platform, ISMS.online, simplifies compliance, offering tools for real-time monitoring and risk management, ensuring your organisation remains secure and competitive.

How to facilitate digital transformation with ISO 27001:2022

ISO 27001:2022 provides a comprehensive framework for organisations transitioning to digital platforms, ensuring data protection and adherence to international standards. This standard is pivotal in managing digital risks and enhancing security measures.

How to Manage Digital Risks Effectively
ISO 27001:2022 offers a risk-based approach to identify and mitigate vulnerabilities. By conducting thorough risk assessments and implementing Annex A controls, your organisation can proactively address potential threats and maintain robust security measures. This approach aligns with evolving cybersecurity requirements, ensuring your digital assets are safeguarded.

How to Foster Secure Digital Innovation
Integrating ISO 27001:2022 into your development lifecycle ensures security is prioritised from design to deployment. This reduces breach risks and enhances data protection, allowing your organisation to pursue innovation confidently while maintaining compliance.

How to Build a Culture of Digital Security
Promoting a culture of security involves emphasising awareness and training. Implement comprehensive programmes that equip your team with the skills needed to recognise and respond to digital threats effectively. This proactive stance fosters a security-conscious environment, essential for successful digital transformation.

By adopting ISO 27001:2022, your organisation can navigate digital complexities, ensuring security and compliance are integral to your strategies. This alignment not only protects sensitive information but also enhances operational efficiency and competitive advantage.

What are the key considerations for implementing ISO 27001:2022?

Implementing ISO 27001:2022 involves meticulous planning and resource management to ensure successful integration. Key considerations include strategic resource allocation, engaging key personnel, and fostering a culture of continuous improvement.

Strategic Resource Allocation
Prioritising tasks based on comprehensive risk assessments is essential. Your organisation should focus on high-impact areas, ensuring they receive adequate attention as outlined in ISO 27001:2022 Clause 6.1. Utilising platforms like ISMS.online can automate tasks, reducing manual effort and optimising resource use.

Engaging Key Personnel
Securing buy-in from key personnel early in the process is vital. This involves fostering collaboration and aligning with organisational goals. Clear communication of the benefits and objectives of ISO 27001:2022 helps mitigate resistance and encourages active participation.

Fostering a Culture of Continuous Improvement
Regularly reviewing and updating your Information Security Management Systems (ISMS) to adapt to evolving threats is crucial. This involves conducting periodic audits and management reviews to identify areas for enhancement, as specified in ISO 27001:2022 Clause 9.3.

Steps for Successful Implementation
To ensure successful implementation, your organisation should:

  • Conduct a gap analysis to identify areas needing improvement.
  • Develop a comprehensive project plan with clear objectives and timelines.
  • Utilise tools and resources, such as ISMS.online, to streamline processes and enhance efficiency.
  • Foster a culture of security awareness through regular training and communication.

By addressing these considerations, your organisation can effectively implement ISO 27001:2022, enhancing its security posture and ensuring alignment with international standards.

Start your ISO 27001:2022 journey with ISMS.online. Schedule a personalised demo now to see how our comprehensive solutions can simplify your compliance and streamline your implementation processes. Enhance your security framework and boost operational efficiency with our cutting-edge tools.

How Can ISMS.online Streamline Your Compliance Journey?

  • Automate and Simplify Tasks: Our platform reduces manual effort and enhances precision through automation. The intuitive interface guides you step-by-step, ensuring all necessary criteria are met efficiently.
  • What Support Does ISMS.online Offer?: With features like automated risk assessments and real-time monitoring, ISMS.online helps maintain a robust security posture. Our solution aligns with ISO 27001:2022’s risk-based approach, proactively addressing vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Why Schedule a Personalised Demo?: Discover how our solutions can transform your strategy. A personalised demo illustrates how ISMS.online can meet your organisation’s specific needs, offering insights into our capabilities and benefits.

How Does ISMS.online Enhance Collaboration and Efficiency?

Our platform fosters seamless teamwork, enabling your organisation to achieve ISO 27001:2022 certification. By utilising ISMS.online, your team can enhance its security framework, improve operational efficiency, and gain a competitive edge. Book a demo today to experience the transformative power of ISMS.online and ensure your organisation remains secure and compliant.


Sam Peters

Sam is Chief Product Officer at ISMS.online and leads the development on all product features and functionality. Sam is an expert in many areas of compliance and works with clients on any bespoke or large-scale projects.

Related Topics

ISO 27001

From Fragmented to Fine-Tuned: How Logiq Built a Robust, ISO 27001-Certified ISMS

“IO eliminates ambiguity, increases accountability, and provides end-to-end traceability from risk to control to evidence.”

Lars Hauger CTO, Logiq

Learn how Logiq:

  • Achieved ISO 27001 certification in 12 months
  • Used the Assured Results Method to streamline compliance and certification
  • Leveraged Dunamis Technology’s consultancy to support success
  • Unlocked improved information security engagement across the business.

Logiq is a Nordic SaaS provider specialising in secure and high-availability information exchange between businesses. For more than 25 years, Logiq have operated a mission-critical digital trade network that handles large-scale EDI, e-invoicing, and document flows for enterprises throughout the Nordic region.

Logiq’s service platform runs 24/7 with >99.99% uptime and is an integral component in the financial and supply-chain processes of its customers.

“We needed a unified governance platform with predictable workflows, evidence management, and strong auditability.”

Lars Hauger CTO, Logiq

The business’s primary target was to achieve ISO 27001 certification by implementing a clearly structured, audit-ready information security management system (ISMS). This would also support continued compliance with key regulations like GDPR and NIS 2 as well as stringent financial-sector expectations.

Logiq had an existing information ISMS built across different tools and formats, including custom-built intranet, spreadsheets, internal repositories and locally-stored documents. While this approach was functional, it lacked integrated governance, automation, and centralised control. The Logiq team found that maintaining consistency, traceability and version control across policies, registers, controls and audits was challenging.

Lars and the team required guidance to accelerate implementation and ensure a robust, certification-ready ISMS structure, as well a centralised platform to consolidate their efforts and streamline compliance management.

Logiq brought on the services of Dunamis Technology to provide expert support and guidance throughout ISO 27001 implementation. The Dunamis Technology team helped to structure the business’s ISMS, configure registers, refine policy frameworks, and map evidence efficiently. Dunamis Technology recommended using the IO platform to address the issue of Logiq’s existing, fragmented governance environment.

“We solved this by implementing IO, creating a fully centralised, consistent, and version-controlled environment that eliminated ambiguity and increased accountability.”

Ronny Stavem CEO & Head of Digital Security Services, Dunamis Technology

Logiq migrated their existing ISMS content to the IO platform. They then used Dunamis Technology’s implementation methodology, IO’s comprehensive 11-step Assured Results Method (ARM) and the platform’s pre-configured ISO 27001 framework to establish a robust ISMS in line with the requirements of the standard.

“Our key focus was ensuring the IO platform was used optimally and translating complex standards and auditor expectations into practical, operationally suited workflows.”

Ronny Stavem CEO & Head of Digital Security Services, Dunamis Technology

The Logiq team leveraged the platform’s core compliance management features to ensure certification success: centralised policy management, risk management module, asset and supplier registers, automated compliance mapping, and structured reporting. The audit, corrective action and evidence-linking features also provided a clear audit trail.

“The guided frameworks, pre-configured ISO control sets, and automated modules for policies, assets, and audits significantly streamlined our workflows.”

Lars Hauger CTO, Logiq

The Logiq team cite the IO platform’s pre-configured ISO 27001 framework and automated evidence management as the most valuable elements of working with IO: “It eliminated uncertainty and simplified complex tasks.”

“Dunamis Technology provided expert guidance throughout the implementation helping structure our ISMS, configure registers, refine policy frameworks, and map evidence efficiently.”

Lars Hauger CTO, Logiq

Logiq achieved ISO 27001:2022 certification in approximately 12 months, including planning, migration of existing content, and internal readiness assessments. Lars estimates that working with Dunamis Technology and IO enabled the business to reduce ISMS maintenance, evidence handling and audit preparation time by 40-60%.

Lars said: “The consolidation of documentation alone saved substantial operational hours across the organisation.”

“IO eliminates ambiguity, increases accountability, and provides end-to-end traceability from risk to control to evidence.”

Lars Hauger CTO, Logiq

The support provided by Dunamis Technology also directly accelerated Logiq’s path to certification, ensuring the business’s workflow aligned with ISO 27001 requirements. Their audit experience helped Logiq to shape a definitive, certification-ready ISMS within the IO platform. They were able to translate standards and auditor expectations into practical, operationally suited workflows for Logiq.

“Dunamis Technology’s audit experience and practical recommendations were instrumental in shaping a certification-ready ISMS. Their experience ensured that our ISMS became both compliant and genuinely usable.”

Lars Hauger CTO, Logiq

Team Logiq has also unlocked unexpected benefits from using IO. With ISO 27001 compliance consolidated into one platform, the business has strengthened cross-department information security alignment. Roles and responsibilities are more transparent and non-security stakeholders are more engaged. As a result, Logiq has built a stronger organisation-wide governance culture.

“Even non-technical stakeholders were able to adopt the IO solution with confidence once they had adjusted to the new structure.”

Lars Hauger CTO, Logiq

The Logiq team continue to evolve their ISMS in line with ISO 27001’s continuous improvement requirements by expanding ISMS workflows and maturing supplier management controls. The business is also leveraging the IO platform for broader compliance areas including NIS 2 and future regulatory requirements with the support and expertise of Dunamis Technology.

“The platform’s architecture is ideal for managing multiple standards simultaneously, which is critical for Logiq given their future compliance needs.”

Ronny Stavem CEO & Head of Digital Security Services, Dunamis Technology

ISO 27001

The Biggest AI Governance Challenges in 2026

This year’s Safer Internet Day theme, smart tech, safe choices – exploring the safe and responsible use of AI, stresses the importance of responsible AI use. AI use has become commonplace in business, offering leaders a tempting combination of increased productivity and reduced costs. As such, organisations are now using AI for everything from their recruitment efforts to their threat monitoring. However, implementing and using AI ethically, responsibly, and safely isn’t just a nice-to-have. It’s key to ensuring compliance with regulations like the EU AI Act, safeguarding sensitive customer information, and mitigating risk. Our State of Information Security Report 2025 exposed the key AI-related challenges organisations are facing, from governance and implementation struggles to AI-powered attacks and emerging threats. In this blog, we explore these challenges and how organisations can address them. Shadow AI One in three (34%) respondents to the State of Information Security Report 2025 said internal misuse of generative AI tools, also known as shadow AI, was a key emerging threat concern for their business over the next 12 months. Meanwhile, 37% shared that their employees had already used generative AI tools without organisational permission or guidance. Shadow AI is a pressing issue for organisations. Unauthorised AI use can increase the risk of data breaches and violations of data protection regulations, potentially leading to heavy fines for non-compliance as well as reputational damage. To manage shadow AI use, businesses must first identify where AI is being used and what it’s being used for. Consider limiting access to these domains and platforms until your business has established and shared clear governance and usage policies. Create AI usage policies that define which AI tools are approved and which are not. Establish guidelines around the types of data that can and cannot be entered into prompts – for example intellectual property, customer data and financial data should never be entered into free, public versions of large language models. Implement an employee education programme to ensure staff are aware of their information security responsibilities, including safe AI usage. Firewalls or DNS filtering to block prohibited sites can act as strong technical controls, however this may lead to employees finding other ways to access them regardless. Consider fostering an open environment where there are clear policies for use and employees can ask questions about new AI tools, with a streamlined approval process. The Pace of AI Adoption Over half (54%) of the respondents to our State of Information Security Report admit their business adopted AI technology too quickly and is now facing challenges in scaling it back or implementing it more responsibly. The Report’s findings reflect the vast gulf between the pace of AI adoption and the pace of AI governance. Often, businesses are implementing guardrails around AI usage only after errors have occurred, leaving businesses scrambling to course correct. ISO 42001 can offer a robust, proactive solution. The standard provides a framework for establishing, maintaining and continually improving an AI management system (AIMS), emphasising ethical, responsible AI use. Organisations can take a strategic approach to ongoing compliance using the Plan-Do-Check-Act (PDCA) cycle. To achieve ISO 42001 compliance, businesses must establish an AI policy, assign AI roles and responsibilities, assess and document the impacts of AI systems, implement processes for the responsible use of AI systems, assess AI risk, and more. The emphasis on continual improvement requires businesses to continually evolve their AIMS for ongoing certification. ISO 42001 certification can enable your organisation to manage AI risk, ensure stakeholder trust and transparency, and streamline compliance with regulations like the EU AI Act. Emerging AI-Powered Threats Respondents to our State of Information Security Report 2025 cited several AI-related risks their top emerging threat concerns for the next 12 months. 42% were concerned about AI-generated misinformation and disinformation, while 38% cited AI phishing as a core issue. 34% of respondents said shadow AI was a concern, while 28% were concerned about deepfake impersonation during virtual meetings. The data suggests many of these threats are already reality – over a quarter (26%) of respondents had experienced AI data poisoning in the last 12 months. Implementing information security best practices, such as those provided by the ISO 27001 framework, can also support businesses in tackling AI-driven threats. The ISO 27001 standard requires organisations to implement (or justify their reasoning for choosing not to implement) core controls such as privileged access rights, employee information security awareness training, threat intelligence and secure authentication. These best practices form a solid baseline from which organisations can mitigate risks associated with AI-driven threats. Privileged access rights, for example, could limit the damage of an employee falling victim to an AI-powered phishing attack by limiting their user-level access to information and systems, while information security training and awareness could stop that employee falling victim to the attack entirely. Case Study: AI Clearing Construction platform AI Clearing knew that ISO 42001 certification would demonstrate that their AI system adhered to the highest standards and rigorous testing, increasing customer trust. The business leveraged the IO platform for their compliance, streamlining ISO 42001 implementation while retaining complete control over their governance, risk and privacy requirements. Learn how AI Clearing built a robust AIMS, efficiently managed AI risk and achieved the world’s first ISO 42001 certification: Read the AI Clearing case study The Strategic AI Governance Advantage AI technology offers a tempting selection of benefits for businesses, but it can also increase business risk. It powers some of the biggest cyber threats facing organisations in 2026. This Safer Internet Day, we encourage businesses to consider leveraging frameworks like ISO 42001 to implement AI safely, responsibly, and in line with regulatory requirements. Businesses that take a strategic approach to AI governance will be able to proactively manage AI risk, boost customer trust and unlock operational efficiencies.
ISO 27001

Why Regulators And Investors Expect Companies To Address a Triple Risk

Organizations fret about security and privacy risk. And more recently, they've paid attention to AI risk. But how often do they think of all three in the same conversation? Increasingly, it's becoming clear that they should. Laws covering data protection, cybersecurity, and AI have quadrupled since 2016 across the U.S., EU, UK, and China. The SEC has already proved that it's serious about cybersecurity. Its cybersecurity rules, effective December 2023, are already reshaping how public companies handle breach disclosure. Form 8-K Item 1.05 now requires companies to disclose material cybersecurity incidents within four business days of determining materiality, not from when the incident was discovered. Form 10-K Item 106 mandates annual disclosure of risk management processes and board oversight structures. The Commission isn't afraid to punish companies that it believes to have downplayed security incidents. Just over a year ago in October 2024, the SEC settled enforcement actions against four public companies (Unisys, Avaya, Check Point, and Mimecast) for misleading investors about the impact of the 2020 SolarWinds cyberattack. The combined penalties approached $7 million. Unisys alone paid $4 million for describing cyber risks as "hypothetical" in its filings, while internal teams knew of actual intrusions. Between December 2023 and January 2025, 55 cybersecurity incidents were reported via Form 8-K filings. Beyond the SolarWinds-related actions, Flagstar paid $3.55 million in December 2024 for describing a breach affecting 1.5 million people as mere "access" when data had actually been exfiltrated. These penalties demonstrate a need to connect cybersecurity disclosure with broader enterprise risk management. The SEC's formation of a new Cyber and Emerging Technologies Unit in February 2025 signals this scrutiny will continue. That replaced the Crypto Assets and Cyber Unit. CETU also hints at the importance of factoring AI into these risks, as it specifically includes both AI and cybersecurity practices in its mandate. Fragmented Governance Creates Compounding Exposure American companies with European operations also face additional pressure from the EU AI Act, which took effect in August 2024. The law, which comes with compliance deadlines staggered through 2027, applies extraterritorially. U.S. businesses placing AI systems in the EU market or deploying AI whose outputs affect EU users must comply. The stakes are substantial. Penalties for prohibited AI practices reach €35 million or 7 percent of global annual revenue, whichever is higher. High-risk categories, covering AI used for employment decisions, credit scoring, and healthcare diagnostics, require conformity assessments, technical documentation, and human oversight mechanisms. Prohibitions on unacceptable-risk AI systems took effect in February 2025. AI Is Showing Up In Disclosure Documents Investor expectations are shifting as these risks evolve. Regulators and shareholders are making it clear that the old model of separate teams managing cybersecurity, privacy, and AI as distinct domains no longer works. AI has migrated from boardroom opportunity discussions to the risk factors section of annual reports with remarkable speed. Seventy-two percent of S&P 500 companies now disclose material AI risks, up from just 12 percent in 2023. The concerns they cite most frequently are reputational damage (38 percent of disclosing companies), cybersecurity implications, and regulatory uncertainty. Board oversight has followed. According to ISS-Corporate, 31.6 percent of S&P 500 companies disclosed board oversight of AI in their 2024 proxy statements. That's an 84 percent year-over-year increase. Those that don't impose such oversight risk material shareholder harm, which could lead to potential negative vote recommendations. Last year Glass Lewis, a proxy advisory firm that advises institutional shareholders on how to vote, issued new benchmark guidelines directly addressing AI governance. The trouble with managing cybersecurity, privacy, and AI separately is that incidents relating each of these bleed into the others. A single breach can simultaneously trigger SEC disclosure obligations, GDPR notification requirements, state privacy laws, and (if personal data trained an AI system) emerging AI regulations. So the time has come to merge consideration of these risk areas, but none of this is easy. According to the National Association of Corporate Directors' July 2025 governance outlook, AI is now a routine topic for 61 percent of boards, yet few have integrated it properly into governance structures. Why? Cultural friction is one reason. Security, privacy, and AI teams have historically operated with different vocabularies, risk frameworks, and reporting structures. Technology integration adds another layer of difficulty; siloed GRC tools create fragmented approaches to risk assessment, audit documentation, and evidence collection. Budget constraints force painful tradeoffs between building integrated infrastructure and meeting immediate compliance deadlines. Standards Frameworks Offer A Path Forward The good news: major standards bodies anticipated this convergence. ISO's High-Level Structure means that ISO 27001 (information security), ISO 27701 (privacy), and the newer ISO 42001 (AI management systems) share compatible architectures, enabling organizations to build unified management systems rather than parallel bureaucracies. Practical integration typically starts with cross-functional steering committees that include privacy, cybersecurity, legal, and AI representatives. From there, organizations develop shared risk taxonomies and (where budgets allow) unified GRC platforms that eliminate redundant assessments. Role boundaries are already blurring: according to an IAPP and EY survey, 69 percent of chief privacy officers have acquired AI governance responsibilities. Organizations that don't evolve their practices along these lines risk regulatory exposure. For those that do, lower regulatory friction, reduced audit burden, and stronger investor confidence await.
ISO 27001

How Spenn Group Unlocked ISO 27001 Success with IO and Dunamis Technology

“The IO platform acted as a single hub to link essential items like risks, assets, and controls. The integrations made it easier for us to collect evidence, manage risk, and demonstrate a clear audit trail.”

Kristian Kolstad Chief Product & Technology Officer (CPTO), Spenn Group

Learn how Spenn Group:

  • Achieved ISO 27001 certification in 10 months
  • Used the IO platform to streamline ISMS implementation and ISO 27001 compliance
  • Leveraged Dunamis Technology’s vCISO expertise to support success
  • Built a culture of information security engagement across the business.

Spenn Group AS (Spenn Group) builds and operates a platform enabling an ecosystem of customer loyalty programs. Based in Norway, the company operates the new Nordic loyalty currency, Spenn, established in collaboration with Strawberry, Norwegian Air Shuttle, and Reitan Retail. Spenn unifies reward programs allowing members to earn and redeem points across hotels, flights, and groceries, making it a common, flexible ecosystem for loyalty in the Nordics.

As a fast-growing startup, Spenn Group needed to rapidly – but strategically – implement an information security management system (ISMS) to achieve ISO 27001 certification. The business also needed to demonstrate General Data Protection Regulation (GDPR) compliance. While the team was aware of these key information security and data privacy requirements, the business did not have the internal resources required to efficiently implement ISO 27001 and align with GDPR requirements.

“We were a startup and wanted to implement information security in our work early on, since a certification was a requirement from our founders (Norwegian, Strawberry and Reitan Retail) and it would be a competitive advantage.”

Kristian Kolstad CPTO, Spenn Group

Kristian and the Spenn Group team knew that establishing and continually improving a robust, ISO 27001-certified ISMS would allow the business to protect its sensitive customer data and satisfy the trust requirements of Spenn Group’s high-profile corporate owners. In addition, successful certification and the trust associated with competent information security management would also provide a competitive advantage for the business.

Spenn Group used the expert virtual Chief Information Security Officer (vCISO) guidance and support provided by IO partner, Dunamis Technology. The Dunamis Technology team recognised the business’s need for swift certification and recommended IO’s efficient compliance management platform to implement and manage the complex policies, controls and documentation required for ISO 27001 certification.

“Spenn Group needed to rapidly implement security as a startup while avoiding the time-consuming manual, document-centric approach some of their managers had previously experienced. This was addressed by leveraging the IO platform, which provided templates and built-in processes to get them quickly up and running.”

Ronny Stavem CEO & Head of Digital Security Services, Dunamis Technology

The platform’s built-in templates, processes and guidelines enabled Kristian and the Spenn Group team to quickly establish an ISMS with the ongoing support of Dunamis Technology.

“The pre-built content of policies, controls, and frameworks allowed us to begin the ISO 27001 implementation with a significant portion of the documentation already complete, reducing administrative overhead.”

Kristian Kolstad CPTO, Spenn Group

With Dunamis Technology’s expertise and the business’s ISO 27001 project contained within the user-friendly, intuitive IO platform, Spenn Group took a holistic, structured approach to implementing the ISO 27001 standard, working strategically through certification requirements.

“The IO platform acted as a single hub to link essential items like risks, assets, and controls. The integrations made it easier for us to collect evidence, manage risk, and demonstrate a clear audit trail.”

Kristian Kolstad CPTO, Spenn Group

Dunamis Technology ensured top management at Spenn Group was involved from early in the process and provided workshops to support progress. The vCISO support and guidance they provided enabled Kristian and the Spenn Group team to move swiftly and confidently through the ISO 27001 certification process.

“Dunamis Technology’s support allowed us to rapidly establish a robust ISMS framework, utilise the IO platform effectively, and confidently navigate the complex requirements necessary to achieve ISO 27001 certification.”

Kristian Kolstad CPTO, Spenn Group

Spenn Group successfully achieved ISO 27001 certification in around 9-10 months. Kristian estimates that by using IO and Dunamis Technology, the business achieved this in just 50% of the time it would have taken them had they used a manual, document-centric approach.

For Spenn Group, the most valuable element of using the IO platform was the ability to maintain control over the project implementation and to establish a clear overview and understanding of the ISMS structure. Kristian said: “This clarity ensured the team knew what needed to be done and why, making the entire certification process manageable.”

The IO platform’s usability and key integrations have also enabled Spenn Group to encourage employee engagement with information security, a core tenet of ISO 27001 compliance, and something Dunamis Technology had identified as vital to ongoing success.

“An unexpected but important benefit of IO was that the platform’s user-friendliness and centralised nature led to easier organisational embedding. This ensured that the security work more readily became an integrated and natural part of Spenn Group’s daily operations and culture. We are using Slack for internal communication and integrating IO with Slack has given us employee involvement.”

Kristian Kolstad CPTO, Spenn Group

Kristian also praised the support provided by the Dunamis Technology team: “Their expertise and forward-thinking approach ensured the complex implementation process was managed effectively, resulting in a smooth and confident path to achieving certification.”

The Spenn Group team are focusing their efforts on the ongoing operation and maintenance of their ISMS to ensure the business sustains its ISO 27001 certification. However, the company is also considering implementing the ISO 9001 standard to expand their management systems into quality assurance.

ISO 27001

WEF Report: Fraud Is Now CEOs’ Biggest Cyber Concern, but It’s Not the Only One

Five years is a long time in cybersecurity. Yet that’s how long the World Economic Forum (WEF) has been polling CEOs for its Global Cybersecurity Outlook reports. The hope is that the resulting insight will empower business leaders to adjust strategy and navigate a fast-evolving threat landscape. This year’s offering places fraud, AI and geopolitics firmly at the top of a growing list of concerns. And as was the case last year, cyber resilience is the goal all are aspiring to. Yet as we discussed in the IO (formerly ISMS.online) State of Information Security Report 2025, there’s often quite a gap between diagnosing the problem and doing something about it. What WEF Found WEF polled just over 800 C-level executives for this year’s report. Among its key findings are the following: Fraud takes top spot CEOs and CISOs diverged a little in terms of their top two concerns. While CISOs remained consistent from last year in citing (in order) ransomware and supply chain disruption, their CEO counterparts placed cyber-enabled fraud in top spot, followed by AI vulnerabilities. By fraud, they mean enterprise-focused threats like phishing/smishing/vishing, invoice fraud (like BEC), and insider fraud, but also crime types more commonly associated with consumer losses like ID theft and even investment fraud/crypto scams. The IO report seems to agree. It revealed that 30% of respondents experienced phishing over the previous 12 months, up from just 12% in 2024. As a recent report from Microsoft highlights, there’s a sophisticated and resilient global infrastructure in place to facilitate certain types of fraud like BEC which impact enterprises. But even nominally consumer-focused campaigns centred around things like ID theft can touch the corporate world. As Check Point argued in a recent write-up, when scammers are able to harvest personal and device information, including “liveness” selfies, from individuals they could use the info beyond ID fraud. Specifically, it could be operationalised to bypass corporate authentication systems, and impersonate employees in IT helpdesk password resets. And if individuals lose big sums in investment scams, they might be more vulnerable to coercion/blackmail as malicious insiders. AI is supercharging cyber risk AI was also highlighted by WEF respondents as a key driver of cyber risk. But interestingly, less in terms of its ability to power phishing, deepfakes and malware (which concerned 28%), and more in terms of data leaks which could arise from misuse of GenAI (30%). This points to a concern about the growing enterprise use of AI expanding the cyber-attack surface. In fact, 87% of respondents believe AI vulnerabilities are increasing (versus 77% who say the same about fraud and 65% supply chain disruption). IO data sheds more light on the issue. A third (34%) of respondents told us they’re concerned about shadow AI, with 54% admitting they adopted GenAI too quickly and now face challenges implementing it more responsibly. Risk tends to thrive in the shadows: what organisations can’t see, they can’t manage. Geopolitics is a key influencer of security strategy Nearly two-thirds of respondents told WEF that geopolitically motivated cyber attacks are a key consideration when devising their cyber-risk management strategies. Volatility in this area has forced almost all (91%) large organisations to adjust their approach to security, the report found. That matches IO’s take, which found that 88% of US and UK firms fear state-sponsored attacks, and nearly a quarter (23%) say their biggest concern for the year ahead is a lack of preparedness for “geopolitical escalation or wartime cyber operations”. A third (32%) claim that managing geopolitical risk is their primary motivation for strong infosec and compliance. More worryingly, 31% of WEF survey respondents reported low confidence in their nation’s ability to respond to major cyber incidents, up from 26% last year. The figure rises to 40% in Europe. The government must accelerate implementation of the measures in its Cyber Security and Resilience Bill and Cyber Action Plan. Supply chains remain a barrier to resilience Supply chains continue to be a significant source of cyber risk, and one that remains difficult to manage. Two-thirds (65%) of respondents told WEF it is their greatest challenge to becoming cyber resilient, up from 54% last year and just above the fast-moving threat landscape (63%) and legacy systems (49%). They’re right to be concerned. Some 61% of UK/US organisations told IO their business has been impacted by a security incident caused by a third-party vendor in the past year. Many said it led to customer/employee data breaches (38%), financial loss (35%), operational disruption (33%), churn/loss of trust (36%), and increased partner scrutiny (24%). Towards Resilience Against this backdrop, business and security leaders know they can’t stay 100% breach proof. So, the focus must shift towards resilience: how to anticipate, withstand and recover quickly from incidents, maintaining as close to “business as usual” as possible. As the JLR and M&S breaches have shown, this is easier said than done. According to WEF, the biggest barriers to cyber resilience are a rapidly evolving threat landscape and emerging technologies (61%); third-party vulnerabilities (46%); and cyber skills and expertise shortages (45%). Legacy and funding were also cited as key. So how can organisations surmount these challenges? Interestingly, the report found that more resilient organisations were more likely to: Hold board members personally liable in the event of breaches Have a positive view of cyber-related regulations Have adequate skills to achieve their cyber objectives Assess the security of AI tools before deployment Involve security in procurement Simulate incidents and plan recovery exercises with partners Assess the security maturity of suppliers. Many of these things are mandated by best practice standards like ISO 27001 and ISO 42001. The latter is particularly well suited to helping organisations close the governance gap and manage risk (including data leakage) across an expanding AI attack surface. According to IO, 80% of UK/US organisations have aligned with standards like this to build resilience in a structured, risk-based way. Against the backdrop of a volatile business and threat landscape, those who do not are at an increasing disadvantage.
ISO 27001

700Credit Breach: API Risks Put Financial Supply Chain Governance Under the Spotlight

What does the 700Credit breach show about the financial data system and supply chain risks, and what lessons can be learned? By Kate O’Flaherty In December, credit report and identity verification services provider 700Credit admitted it had suffered a data breach impacting 5.8 million customers. The incident involved a compromised third-party API linked to the 700Credit web application. The breach was discovered in October 2025, but attackers gained access to the API in July, allowing them to steal sensitive data including names, dates of birth and social security numbers without being detected. It was a failure of visibility and supply chain governance that all firms should be aware of. What does the 700Credit breach show about the financial data system and supply chain risks, and what lessons can be learned? Application-Centric Fintechs, lenders, dealers and credit bureaus all rely on huge integration networks, often with APIs that offer direct access to sensitive data. When one node in the network goes down, everyone downstream inherits the impact. The 700Credit breach is a prime example of this vulnerability in action. With APIs allowing attackers to access customer data, the 700Credit incident shows “just how interconnected the financial ecosystem has become”, says Dan Kitchen, CEO, Razorblue. Although the company’s internal network was not compromised, attackers were still able to access and exfiltrate large volumes of financial-grade identity data via a trusted application layer integration. “This demonstrates that, in contemporary financial ecosystems, APIs and web applications effectively are the system, and compromise at this layer can be just as damaging as a core network intrusion,” says Mark Johnson, head of presales security at ANS. Large integration networks concentrate risk by creating high-value data access paths that bypass traditional controls, says Johnson. “APIs designed for efficiency and scale can become ‘straight-through’ conduits into sensitive personally identifiable information if over-privileged, insufficiently monitored or inadequately segmented.” In the case of 700Credit, governance structures didn’t keep pace with the complexity of the ecosystem. 700Credit’s attackers’ prolonged dwell time suggests that governance mechanisms have “not evolved to match the operational complexity of API-driven ecosystems”, Johnson observes. The 700Credit breach underscores a crucial point: 96% of API attacks come from authenticated sources, meaning attackers are not breaking in. They are instead using “legitimate, trusted credentials”, adds Eric Schwake, director of cybersecurity strategy at Salt Security. Since most organisations underestimate their API inventory by 90%, these supply chain vulnerabilities can result in as much as 10 times the amount of leaked data seen in traditional breaches, he warns. Opaque Financial Supply Chains The 700Credit incident is just one example of how the financial data system has become too complex, interconnected and opaque for the level of governance applied to it. Most organisations have no clear map of where their data flows, how it’s accessed, which partners can query it, how they secure it and how quickly they disclose incidents. Businesses “rarely have visibility beyond their immediate vendors, let alone the suppliers their vendors use”, says Razorblue’s Kitchen. The complexity of these chains has now outpaced traditional governance structures, leaving organisations exposed to third-party and even fourth-party failures, such as a credit bureau using an API that relies on a cloud provider or data enrichment service with its own vulnerabilities, he says. One of the core weaknesses in third party supply chain management is the lack of comprehensive visibility and control over vendors’ security postures, agrees Tracey Hannan-Jones information security consulting director, UBDS Digital. “Many organisations rely on external providers for essential services, but often fail to conduct rigorous, ongoing risk assessments or enforce standardised security controls across the supply chain. This creates blind spots where vulnerabilities can be introduced and exploited far too easily.” Another significant weakness is the absence of robust contractual and technical requirements for third-party providers, says Hannan-Jones. “Organisations frequently lack clear, enforceable agreements that mandate security standards, incident response protocols and regular audits.  Even when such requirements do exist, enforcement and monitoring can be inconsistent, especially as the number of suppliers grows.” Adding to the issue, cybersecurity teams usually don’t devote enough time or expertise to their third-party risks. The area is often seen as “tedious and repetitive”, says Pierre Noel, field CISO at Expel. “It’s extremely difficult to recruit seasoned cybersecurity specialists and convince them to perform a third-party assessment every week, month or year.” Firms often fail to take into account the reality that third-party risks evolve, Noel points out. “The relationship you have with ‘company A’ might start small and evolve significantly a year or two later. Unless your program accommodates this dynamic expansion, a significant and high-risk third-party could go unnoticed until it’s too late.” Regulatory Response The 700Credit incident has had a significant regulatory impact, with the firm sending breach notices to multiple state attorney general offices, including Maine. The firm submitted a consolidated report to the Federal Trade Commission in coordination with the National Automobile Dealers Association and the incident was also reported to the FBI. The regulatory response required after this type of incident shows that lawmakers increasingly view third-party failures as systemic risk. Overall, businesses “shouldn’t be overly optimistic about the reaction of the regulators to this type of issue”, says Expel’s Noel. They will generally advise, “ensure you have an adequate third party management process, and be ready to prove it at every internal or external audit”, he says. However, the regulator is unlikely to impose a process that would cater to a large number of third parties, or go further than just making sure the organisation obtains the ISO or SOC 2 certificate from the contractor, Noel says. “This is why businesses should acknowledge the discrepancy and take the first step to implement a risk management program that exceeds these foundational compliance requirements.” The Digital Operations Resilience Act (DORA), which came into force in the EU, directly addresses supply chain risks by imposing strict requirements on financial entities and their critical IT supply chain partners, says UBDS Digital’s Hannan-Jones. “DORA mandates that organisations implement comprehensive risk management frameworks for third-party relationships, including due diligence, contractual clauses ensuring data security, continuous monitoring, and the ability to terminate contracts if providers fail to meet resilience standards.  Regular testing, incident reporting and clear accountability for outsourced functions is also required.” Governance Structures With attackers able to access data via an API, the 700Credit breach has exposed the fact that in many cases, governance structures haven’t kept pace with the complexity of the ecosystem. Annual vendor questionnaires and legacy due-diligence processes simply don’t work when attackers can quietly pull millions of records through an API without being detected. To prevent this type of breach from happening, governance must include continuous monitoring, supply-chain transparency, obligation mapping, and ISO-aligned governance such as ISO 27001 and ISO 27701. But these are not just checkboxes. Businesses need to “move beyond static compliance” and “embrace continuous oversight”, says Razorblue’s Kitchen. That means “monitoring API traffic in real-time, not just during annual audits”. At the same time, firms should demand transparency from their vendors, mapping obligations and understanding who else is in the chain, he advises. Diane Downie, senior software architect at Black Duck, recommends that organisations take a zero-trust security posture, especially with access points to sensitive information. “Risk assessments of system architectures must consider mitigation against a compromised system, including those of their trusted partners.” Financial organisations can no longer rely on trust-based vendor relationships or slow disclosure processes. They need to be fundamentally more transparent, taking a standards-driven approach to managing their data ecosystem. The benefits of this approach are clear. The real cost of breaches goes far beyond regulatory penalties, creating substantial risk for operational paralysis and reputational damage, says Kitchen. “At a macro level, incidents like this can trigger sharp drops in share price, erode investor confidence, and create nervousness in the markets – especially for publicly traded firms in sensitive sectors like finance.”
ISO 27001

The Utilities Compliance Challenge

Utilities companies are dealing with fragmentation and silos, preventing a streamlined approach to compliance. A more solid foundation is needed, but how can this be done? By Kate O’Flaherty Utilities companies operate numerous disparate systems, many of which were never meant to be connected to the internet. It’s therefore no surprise that cybersecurity — and compliance with regulations covering the area — remain one of the sector’s greatest challenges. In 2010, the Stuxnet worm demonstrated the real-life threat posed by a cyber-attack on the sector, after centrifuges used in the Iranian nuclear programme were obliterated. More recently, the Russia-Ukraine war has seen several state-sponsored cyber-attempts on Ukraine’s electricity grid. Meanwhile, in the US, the water sector has also been under attack. The growing risk of attacks such as these and their devastating consequences has led to a number of regulations intended to shore up utilities security, including the EU Network and Information Systems Directive 2 (NIS2) and UK Cybersecurity and Resilience Bill. As utilities strive to comply with these multiple rules, some have criticised the industry for being slow to adapt. Indeed, a recent blog by Ernst & Young highlights a need for artificial intelligence (AI) technology to manage complex risk management strategies and ensure compliance. But in an industry already dealing with fragmentation and silos, is adding more tools really the answer? Keeping Pace With Regulation Many experts say no. Instead, utilities need a unified, engineered compliance backbone that matches the complexity of the physical systems they run. This starts with fixing the foundations, rather than layering new technologies on top of old fragmentation. Recent cyber incidents affecting utilities highlight a challenge that goes beyond keeping pace with regulation. The pressure utilities face is real, but it’s not because rules are moving faster than organisations can respond. It’s because the cost of fragmented, disconnected compliance and risk ownership is “rising faster than utilities can absorb”, Darren Guccione, CEO and co-founder at Keeper Security tells IO. Utilities operate some of the most interconnected physical systems in the world. Yet the processes governing cybersecurity, operational resilience, privacy, third-party access and regulatory compliance are often disconnected from one another. “Cybersecurity, operational technology (OT) security, privacy, audit and regulatory teams are often organised as parallel functions, each with their own controls, tools and reporting lines, but limited shared visibility or coordination,” Guccione points out. “That fragmentation creates real exposure.” These silos lead to “poor communication, duplication of effort, misunderstanding, and slow decision-making”, says Tracey Hannan-Jones, information security consulting director, UBDS Digital.  “So, when new regulations arrive, each department interprets then implements changes differently — or not at all — leading to inconsistencies, inefficiencies, and poorly designed compliance frameworks to address requirements.” The concept of "technical debt" in software — shortcuts that create compounding future costs — “maps perfectly to compliance”, says Rayna Stamboliyska, CEO at RS Consulting. “Every time a utility bolts a new regulatory requirement onto fragmented existing systems, rather than refactoring the foundation, the organisation accumulates ‘compliance debt’. The ‘cost of fragmented compliance’ is actually interest payments on ‘compliance debt’ — and UK utilities are paying compound interest without reducing principal.” Under-Tooled No amount of new technology can solve the issue — especially if it’s simply bolted on top of fragmented systems. In 2024, large enterprises were using an average of 45 cybersecurity tools, according to Gartner. This indicates that being “under-tooled” isn’t the core problem, says Rik Ferguson, VP of security intelligence at Forescout. “On paper, that tool depth can look reassuring. In practice, it often creates a different problem: A security environment that’s busy, noisy and difficult to operate as a coherent whole.” Boards often see extensive tooling and assume coverage is comprehensive, says Ferguson. “Security teams, meanwhile, spend huge amounts of time stitching together information, validating alerts and chasing activity that doesn’t always translate into measurable risk reduction.” Amid this complex environment, organisations may look to AI as the “saviour”. However, this is never going to work because AI thrives on “high-quality, integrated data”, says UBDS Digital’s Hannan-Jones. “In fragmented utilities, data is often poor-quality, scattered, inconsistent or inaccessible.  Without unified data, AI models can only produce limited or unreliable insights.” Another factor to consider is that AI cannot fix organisational silos, Hannan-Jones says. “AI can automate tasks or generate recommendations, but it cannot force departments to collaborate, or share information.” Streamlined Approach Rather than simply adding new tools, utilities firms should work on a streamlined approach to compliance. This can help facilitate central orchestration, local accountability, consistent controls, continuous monitoring and an integrated view of risk. As part of this, standardisation provides “a unified vocabulary and set of procedures” for risk, security, privacy and AI, says Hannan-Jones. For example, ISO 27001 covering information security, ISO 22701 on privacy, and ISO 42001 governing AI management. These frameworks require clear assignment of roles and responsibilities through a centralised approach. This ensures everyone knows who is accountable for what, which will improve coordination and communication, and reduce gaps, says Hannan-Jones. “Organisations can then enforce documented, repeatable processes for risk assessment, incident response and drive continuous improvement,” she explains. At the same time, since ISO standards are risk-based, they require organisations to consider risks holistically, rather than as a silo. The alignment of risk management with business objectives ensures that all departments are “working towards the same goals with a consistent approach”, says Hannan-Jones. When looking to streamline your organisation, the first step is to map and standardise your core processes, Hannan-Jones advises. “Document all key workflows across the organisation, including asset management, maintenance, incident response and risk management.  This will create clarity, expose duplications, identify gaps and provide a strong baseline for standardisation.” It’s important to ensure everyone, including leadership, is on board, says Hannan-Jones. “As senior leaders must champion the unified compliance approach, communicate its value, and allocate resources. Sustained change requires visible support from the top, with clear messaging across the whole organisation.” Benefits of Compliance While challenges remain, regulation is not getting more complex. Instead, it is exposing how messy and fragile internal structures have become. Risk in utilities only becomes an asset when it’s treated like the grid itself: A functioning system that’s connected, continuously monitored and engineered for resilience. The benefits are clear: When compliance becomes coordinated and integrated, utilities gain faster regulatory response, a stronger cyber posture, more trustworthy AI models, better board assurance, and reduced duplication and cost. Coordinated, integrated compliance allows firms to “reclaim operational capacity”, so they can redirect their energy towards improving security outcomes, says Conor Sherman, CISO in residence at Sysdig. “You can then spend your time improving the grid's resilience, rather than arguing over the provenance of a screenshot for an auditor.”
ISO 27001

How Paymenttools Achieved ISO 27001 Certification Success and Unified Compliance Management

“The IO platform is now our strategic umbrella system for managing our entire security and compliance landscape.”

Jan Oetting CISO, Paymenttools

Learn how Paymenttools:

  • Achieved ISO 27001 certification in nine months
  • Used the IO platform to implement a robust ISMS and ensure ISO 27001 compliance
  • Employed SGG’s support and expertise to deliver certification success
  • Continue to leverage the IO platform to manage their entire security and compliance landscape.

Paymenttools are technologists and payment experts with a deep background in retail. The business’s mission is to design payments that make life easier for everyone involved, from checkout staff to end customers, and to improve the shopping experience long-term.

With Paymenttools’ roots in commerce, the team understand that payment transactions are not an afterthought, but a strategic tool for modern business models. They take a holistic approach, considering everything from payment processes and loyalty programmes to our vision of an independent European payment system.

They are driven by a common goal: to future-proof payments with solutions that work reliably today and create real independence tomorrow.

With limited resources for security and risk management, the Paymenttools team needed a lean and pragmatic solution that could be operated by a small, focused team to successfully achieve ISO 27001 certification. As a cloud-native company with a large engineering focus, many traditional, bureaucratic security controls didn’t apply to the business, so being able to easily identify and implement relevant controls was a core priority.

“Our challenge was to maintain a high-security posture and compliance without slowing down our engineers.”

Jan Oetting CISO, Paymenttools

Jan and the team were using tools such as Google Workspace for defining policies and managing risk, but recognised this wasn’t an efficient approach. They required a dedicated platform to manage and maintain their information security management system (ISMS), rather than disparate tools and documentation.

They also needed expert support and guidance to work through the ISO 27001 compliance and certification process. The team needed someone to align with their core security ‘co-pilot’ philosophy: someone to act as a partner, not a blocker, enabling success and finding secure paths to ‘yes’.

“This overall work is part of our strategic shift from reactive compliance to proactive command over our defensive landscape.”

Jan Oetting CISO, Paymenttools

Paymenttools enlisted the expertise of SGG to implement an ISO 27001-compliant ISMS and conduct pre-certification audits, both pre-stage 1 and pre-stage 2. The business also leveraged the IO platform, using the platform’s pre-built ISO 27001 templates and workflows to ensure swift implementation and alignment.

“SGG provided crucial guidance on understanding the standard and how to approach the certification process in a pragmatic, business-focused manner.”

Jan Oetting CISO, Paymenttools

Using the IO platform enabled Paymenttools to streamline their ISO 27001 compliance and efficiently implement and manage associated controls and processes. Chris Gill, Head of Cybersecurity, GRC and Auditing at SGG, said: “The pre‑built templates and workflows aligned to ISO 27001 saved the business significant time and reduced complexity.”

With the support of SGG, Paymenttools leveraged the intuitive, user-friendly IO platform and the IO 11-step Assured Results Method (ARM) to work strategically through certification requirements.

“The Assured Result Methods (ARM) worked perfectly as promised, providing a huge head start where around 70% of the policies were immediately good enough to use. This allowed us to focus on our security strategy: state what you are doing, evaluate risk, then improve.”

Jan Oetting CISO, Paymenttools

The platform’s pre-built elements provided a baseline on which Paymenttools could build and evolve a bespoke, highly tailored ISMS. Core areas the business used included the risk register, asset inventory, interested parties map, security management track and the corrective actions and improvements track.

Collaboration was also a vital element of the partnership. To ensure ongoing success, SGG and Paymenttools consistently aligned on the business’s compliance efforts, ensuring ISO 27001 compliance was progressing as expected.

“The SGG team held workshops with Paymenttools’ staff as and when required to ensure ISO 27001:2022 concepts were clear and understandable.”

Chris Gill Head of Cybersecurity, GRC and Auditing, SGG

Paymenttools successfully achieved ISO 27001 certification in nine months. Jan estimates that by working with IO and SGG, the business saved around 100 person-days in the initial setup compared to a manual approach, plus the time saved in ongoing maintenance work.

“The time needed as overhead for managing different regulations and audits is significantly reduced.”

Jan Oetting CISO, Paymenttools

For Paymenttools, the most valuable elements of the IO platform were the modern policy documentation and asset inventory provided in the ISO 27001 project structure: “The most important element of the IO platform were the predefined policies, specifically because they are optimised for a modern company like ours.”

The Paymenttools team also benefited from the platform’s centralised information security approach across risk management, asset management, corrective actions, and incident response. This allowed the business to consolidate the compliance workload and delay the use of specialised tools until they were absolutely needed.

SGG’s strategic advice and expert guidance were instrumental in Paymenttools’ ISO 27001 achievement, steering the business’s security management in the right direction to ensure certification success.

“Chris at SGG provided crucial guidance on understanding the standard and how to approach the certification process in a pragmatic, business-focused manner. He acted as a true Co-Pilot. He discussed critical areas with the external auditors and justified our decisions, and also provided significant help with risk management.”

Jan Oetting CISO, Paymenttools

While the business successfully achieved ISO 27001 certification, continuous improvement is a requirement for ongoing compliance. As such, Paymenttools and SGG remain focused on maturing the business’s ISMS and remediating any findings.

“Since Paymenttools achieved ISO 27001:2022 certification, SGG have helped mature a number of Paymenttools processes including supplier management, the return of assets, and information security in project management.”

Chris Gill Head of Cybersecurity, GRC and Auditing, SGG

Since achieving ISO 27001 certification, Jan and the team have extended the scope of their compliance to include PCI DSS and the German KRITIS regulation, all within the IO platform. Paymenttools are now beginning to leverage the IO platform as a general policy and risk management tool for the organisation, extending its use beyond just security.

“The IO platform is now our strategic umbrella system for managing our entire security and compliance landscape.”

Jan Oetting CISO, Paymenttools

The team is currently integrating NIS 2 to ensure alignment with the regulation, the NIST Cybersecurity Framework (CSF) to measure maturity, and CoBit as a general control framework.

“We are continuing our journey to mature our security posture from ‘Compliance’ to ‘Command’.”

Jan Oetting CISO, Paymenttools

ISO 27001

From Perimeter Security To Identity As Security

You can't glance anywhere at a security event these days without seeing the phrase 'zero trust'. It's a buzzword alright, but it's a useful one. At its heart is a fundamental shift in security focus away from perimeter security. Zero trust is already an old term, cropping up in industry parlance around 2010, but its principles extend further back than that to the Jericho Forum, a collection of senior cybersecurity executives. Jericho members first coined the term 'deperimeterisation' around 2004. This acknowledged that a 'ring of iron' protective perimeter around the enterprise network was no longer enough. As contractors and other business partners got more access to the network, the idea of an 'inside' and 'outside' became increasingly arcane. Once a castle with a moat, the network had evolved into a city, with multiple gates and plenty of people flowing freely in and out. Deperimeterisation and its successor zero trust shifted their focus to protecting individual assets inside the network. The best way to do that is to continually authenticate who was accessing those assets, and what they were allowed to do with them. That meant focusing on identity as the new security. Those who don't make that transition risk more breaches. The ISMS State of Information Security Report 2025 even puts a number on it: authentication breaches surged tenfold in the past year, from 2% to 20% of incidents. Verizon's Data Breach confirms that credentials remain the top attack vector. Why Credentials Have Become The Skeleton Key Why did credentials become the skeleton key to enterprise systems? Part of it has to do with the evolution of the edge. It's hard to even define the network edge today, with so much of it now spread around different regional data centres and cloud services. Hybrid work also played a part, accelerating the need for people to access the network remotely. Another driver has been the infostealer economy, which has industrialised. This malware pilfered 2.1 billion credentials in 2024 alone, according to Google. Once an infostealer campaign grabs login credentials, they're easy to sell on the dark web, and credential stuffing attackers can then use them to rattle digital doorknobs across the internet. When they do score a hit and unlock yet another account, attackers can be sure that they'll have plenty of time to exploit that hijacked account and get away. At 292 days on average, credential breaches also take the longest to detect, per IBM. Non-Human Users Now Outnumber Human Ones There's another reason why identity has become increasingly important as a part of security: non-human identities. Back in the day, the main users of enterprise computing resources were people. Today, thanks to microservices, APIs, and a burgeoning generation of agentic AI services, non-human users outnumbered humans 144:1 in enterprises during 2025. That was up 56% from the previous year. The growth of AI agents is especially relevant here because those services are becoming more autonomous. As they gain confidence in AI automation, organisations are more likely to give these agents more responsibility. The percentage of such services with privileged access will increase. Identity Is Foundational These trends are why compliance frameworks focus on identity. ISO 27001:2022 Annex A 5.15-5.18 codifies identity controls as part of a broader set of organisational measures covering access control, identity management, authentication information, and access rights. Robust security control frameworks share a common thread: every identity must be unique, least privilege must be the norm, and auditable. MFA should be mandatory for privileged access. These frameworks' focus on identity is timely, as regulators are paying far more attention to this issue. ENISA describes MFA as a smart way to show that you're complying with NIS 2. Companies should take heed, as this EU regulation carries penalties up to €10 million or 2% of global turnover for organisations that don't comply. Moving To An Identity-Focused Security Posture So how can companies adopt an identity-based security posture that's independent of amorphous perimeters? There are concrete components underpinning zero trust. Strong identity and access management is one, which involves ensuring that every user, service, and machine is uniquely identified and continuously authenticated. MFA is a clear way to get ahead of account hijacking, but it isn't without its risks. MFA fatigue is real, while proxies can also be use to intercept MFA sessions, and infostealers can steal session tokens. Token theft can bypass some MFA entirely. In 2024, Microsoft detected 147,000 token replay attacks, up 111% from the prior year. Passwordless authentication using passkeys is another way to stop people falling victim to phishing attacks. It can also stop some of the behaviours that end-users find difficult to give up when trying to get the job done, such as sharing passwords for convenient access. These changes might seem daunting undertakings for many organisations, especially those that have composed their IT infrastructure from multiple systems over time, through acquisitions, fragmented teams, and strategic technology changes. But they can make things easier by beginning with some key principles. Implement ISO 27001 Annex A 5.15-5.18 controls as a baseline. These will guide you in the best-practice implementation of access policies, identity lifecycle management, and authentication standards. A framework like this will give you a solid grounding in governance through measures such as regular access reviews. Agree to inventory non-human identities with the same rigour applied to employees. Conduct a gap analysis and see what it would take to account comprehensively for all service accounts and their TLS certificates or API keys, for example. Ultimately, the goal is to accept that identity security is now a foundational part of security management. After all, you cannot protect what you cannot authenticate.
ISO 27001

The Compliance Era: How Regulation, Technology and Risk Are Rewriting Business Norms

Compliance isn’t the most glamorous thing in the eyes of most business leaders. They may see it as a necessity to avoid regulatory pressure, yet also something that can be handed to a junior member of staff or at least handled on an ad hoc basis. But with technology now the lifeblood of most modern businesses, criminals exploiting this and regulators and other stakeholders consequently pressuring companies to take compliance more seriously, such an approach is no longer sustainable. Compliance and governance must now be an ongoing exercise, supported by unified frameworks and leadership buy-in, to counter the growing plethora of information, cyber and supply chain risks businesses and their stakeholders face. How can this be achieved, though? Cyber Risk Is Business Risk A core driver in the shift of compliance from a checkbox exercise to a strategic priority in the day-to-day operations of businesses is "the sheer breadth of laws, regulations, standards, and good practice” with which they are now expected to comply, according to Stephanie Locke, head of product at AI experts Nightingale HQ. She says non-compliance can lead to significant reputational and financial implications. Notable examples of laws and regulations that have driven this change include the European Union's Network and Information Security Directive 2 (NIS2) and its landmark Artificial Intelligence Act - not to mention the varying data privacy standards in different parts of the world. Given that technology is deeply ingrained in all parts of an organisation's operations, Locke says boards are closely paying attention to these rules and now see IT risk as an enterprise one. With the technology ecosystem - and the regulatory landscape designed to keep it in check - both evolving rapidly, Locke says businesses are now forced to manage cyber risk continuously rather than periodically. She adds: “AI in particular creates new operational, legal, and reputation risks, with early enforcement patterns likely to mirror the disruptive impact GDPR had after launch.” Echoing similar thoughts, Jake Moore - global cybersecurity advisor at antivirus software maker ESET - says the rise of legal frameworks like NIS2 and the EU AI Act has turned “cyber risk into a business risk”. With this in mind, he says both laws necessitate “director-level accountability” and underscore that “compliance now dictates operating models, rather than the other way around”. He tells IO: “The cost of getting it wrong is expensive, and checkboxes can’t always cut it. Compliance may be a longer way of going about things, but it proves organisations can operate securely and at scale.” Regulators are Getting Smarter Regulators aren’t just moving at speed to introduce and tweak industry laws, though. They’re also working much faster behind the scenes to detect companies that may be in breach of their rules, thanks to advancements in artificial intelligence. Using AI, Lee Bryan - founder and CEO of compliance solutions provider Arcus Compliance - says regulators are able to “scan products, packaging, data, and documentation at a scale” and across “entire categories”. The technology is also allowing them to “spot gaps, inconsistencies, and false claims instantly”. He adds that such a major change in how regulators work means brands are no longer able to “hide behind volume, geography, or slow manual checks”, meaning they have no choice but to treat compliance as a crucial business activity or be hit with regulatory action. No Longer an Afterthought Regulators aren’t the only group that expects businesses to take compliance seriously. Other stakeholders, such as investors, customers and partners, are increasingly scrutinising the security and privacy posture of businesses before signing contracts - and even afterwards. In the face of rising supply chain cyber-attacks like the one experienced by SolarWinds, Locke of Nightingale says businesses are aware of the risks that third-party technology vendors can pose if they aren’t complying with cyber risk best practices and rules. She adds: “As a result, security and privacy posture have become core components of commercial and investment due diligence.” Specifically, when it comes to digital due diligence, George Tziahanas - vice president of compliance at archiving software specialists Archive360 - explains potential customers may be deterred from working with businesses that are unable to explain how they store, govern and delete data and see this as an “operational risk”. Existing stakeholders also expect high levels of regulatory compliance from the businesses they work with as they look to avoid being implicated in supply chain incidents.  Tziahanas says failure to do so could result in businesses experiencing “contractual penalties, regulatory action and reputational impact”. Avoiding Siloes Bad compliance isn’t simply businesses viewing it as a tick box exercise, though. Tziahanas explains that compliance gaps like “inconsistent controls, incomplete records, and unreliable data” can result in issues such as “false reporting, failed attestations, and over-retention”. To avoid this, businesses should ideally combine all the different dots of compliance - risk, security, privacy and continuity - into a single governance thread. According to Moore of ESET, doing so will result in their compliance and risk posture shifting from “reactive firefighting” to “proactive” - something that “saves money and hidden costs” at the same time. John Phillips, general manager of EMEA at accounting software provider FloQast, also sees the benefits of a unified and proactive approach to compliance and cyber risk management. He says teams that adopt this approach can “anticipate internal and external pivots, align early with leadership, and focus resources where they will make the biggest impact”. Complying with industry rules and best practices in the early stages of a new business venture or product can also be beneficial in the long run. For starters, Tziahanas of Archive360 says it’ll prevent “costly retrofits” as “classification, retention, and deletion rules” will have already been defined and implemented. A robust compliance posture will also help businesses build strong stakeholder relationships built on trust, adds Tziahanas. This is the key to “enabling faster deal cycles and smoother market entry”. Practical Steps When it comes to building and implementing a strong compliance strategy, respected industry frameworks like ISO 27001, ISO 42001, SOC 2 and ISO 27701 can be a good starting point. Describing them as a “starter playbook for governance”, Locke of Nightingale HQ says they provide businesses with all the “fundamentals’ needed to meet their compliance and governance obligations. She adds that such frameworks also enable organisations and their stakeholders to commit to “shared expectations and commitments” regarding compliance and governance. Clear risk visibility is also important. Bryan of Arcus Compliance explains that business leaders may not be aware of the risks they face because “data, documentation, and suppliers are scattered across systems”. He believes that this can be solved through the adoption of “agile systems, a risk-based approach, and a genuine compliance culture”. For ESET’s Moore, leadership buy-in is essential in making compliance and governance plans work. But that can only be achieved by educating leaders on the fast-expanding cyber threat landscape and how it can affect the business, he says. On the face of it, compliance seems a tedious task only to please regulators. But it can actually benefit businesses by allowing them to spot and solve risks before they cause serious damage. At the same time, it can attract potential customers and strengthen ties with existing ones - all of whom are concerned about recent supply chain cyber-attacks and want to ensure any business they work with takes these risks seriously.
ISO 27001

Five Security and Compliance Trends to Look Out for in 2026

What might the coming 12 months look like for cybersecurity and compliance professionals? We’ve scoured the news, absorbed the predictions of industry experts, and spoken to some directly to bring you our take on 2026. In no particular order, here are five trends that will shape the sector as we work our way through the year. AI Everywhere Benefits Attackers and Defenders As we observed in our State of Information Security Report 2025, AI represents both a threat and an opportunity to network defenders. A threat, in that malicious actors are already using large language models (LLMs) to assist with vulnerability research and exploit development, social engineering, victim reconnaissance, and more. But an opportunity, from both a business growth and cyber defence perspective. Agentic AI will be at the forefront of this dynamic in 2026. Although it was widely criticised as over-exaggerating AI’s role, the risks Anthropic flagged in November – of fully AI-orchestrated cyber-attacks – could become reality this year. On the other side, great strides are being made in SecOps, to bridge skills gaps and help to mitigate alert overload through use of agentic systems. Expect the journey to the “autonomous SOC” to gather pace. We can also expect the ISO 42001 standard to grow in popularity as more organisations look to manage their AI systems securely, ethically and transparently. Business take up has already grown from 1% to 28% between 2024 and 2025, according to IO data. The coming 12 months could see it hit mainstream adoption, as threat actors single out the AI attack surface for special treatment. The Compliance Burden Builds In our report, we warn of a “compliance crunch” for many organisations as they struggle to meet a growing regulatory burden with limited resources. Some 37% admit that compliance is a challenge, and two-thirds (66%) say that they’re finding it difficult to manage in house. Some 85% say more alignment across jurisdictions would help, while two-thirds (66%) argue that the speed of regulatory change makes it difficult to stay compliant. Unfortunately, things aren’t going to improve on this front in 2026. Given that it’s over 12 months since DORA came into force, we’ll see regulators start to sharpen their claws. NIS2 will also get real after being transposed into local law across much of Europe. Then there’s the Data Use and Access Act, the UK’s GDPR update, which will come fully into force by June. And the UK’s answer to NIS2, the Cyber Security and Resilience Bill, which is expected to pass into law. Some deviations from NIS2 will “require scrutiny”, Charles Russell Speechlys partner, Mark Bailey, tells IO. “For example, the bill introduces a broader definition of incidents, meaning organisations may need to reassess what qualifies as reportable and ensure internal processes are calibrated accordingly,” he explains. “Customer communications and contractual obligations will also need to be revisited, particularly where reporting may impact third-party data or expectations of confidentiality.” Software Supply Chain Risks Will Proliferate The open source ecosystem is creaking. Over the latter half of 2025 we witnessed several major threat campaigns spreading across npm. Key among these was IndonesianFoods, a prolific, automated campaign that flooded the registry with tens of thousands of spammy packages. Experts warned the same techniques could be used for more malicious ends. Perhaps even more worrying was the Shai-Hulud worm, whose two waves led to the exposure of developer and cloud secrets on a similarly massive scale. “Open source ecosystems make perfect testbeds for this kind of automation: frictionless publishing, minimal gatekeeping, and an enormous attack surface,” Sonatype CTO, Brian Fox, tells IO. “Attackers have figured that out. Unless we evolve our defences just as quickly, these self-propagating worms will become the default playbook, not the exception.” Randolph Barr, CISO at Cequence Security, adds that AI will accelerate the trend. “The fact that the [IndonesianFoods] payloads were inactive makes this scenario even more worrying,” he tells IO. “The attackers took their time, building trust and distribution over time so they could use it as a weapon later. That's a big change: you don't need malicious code on the first day to create considerable risk down the line. So certainly, efforts that are highly automated and worm-like that take advantage of the size and availability of package registries will grow, not shrink.” Skills and Budgets Set to Lag According to the latest ISC2 Cybersecuity Workforce Study, skills shortages in cyber remain worryingly common. Over a quarter (27%) of global respondents cited governance, risk and compliance (GRC) skills as in high demand. Stalling budgets and a dearth of talent aren’t helping. According to ISACA’s State of Cybersecurity research, over half of professionals (54%) say teams are underfunded, while 58% report ongoing understaffing. ISACA chief global strategy officer, Chris Dimitriadis, tells IO that the gap between fast-evolving threats and slow-moving investment will grow in 2026. "Cyber and compliance teams will be expected to take on far greater responsibility for AI governance and regulatory alignment as new standards come into force. While regulation is a welcome step toward strengthening digital resilience, it also introduces significant operational pressure, particularly when over a quarter of organisations have no plans to hire for digital trust roles in 2026,” he adds. "For cyber-compliance teams, 2026 will bring heavier workloads, rising expectations and increasingly complex landscapes. AI tools will be essential, but technology alone cannot close the vulnerability gap. Resilience will hinge on people – organisations that invest in wider talent pathways, continuous upskilling and AI-literate teams will be the ones able to turn powerful technologies into meaningful, real-world protection." Continuous Compliance and Automation Unlock Value With the threat landscape evolving so rapidly, attack surfaces expanding, and regulatory burden growing, standards like ISO 27001 will increasingly be prioritised in 2026. Their best practices underpin most of the cybersecurity legislation hitting the statute books these days, which will help to simplify compliance. But, in the case of ISO 27001 at least, they’re also moving towards a model of “continuous compliance” that will help organisations enhance cyber resilience in the coming years. The Plan-Do-Check-Act (PDCA) cycle promotes continuous monitoring, measurement and adaptability — critical endeavours in these volatile times. With limited skills and resources to hand, many organisations will turn to automation to help them harness these benefits. By letting machines do the grunt work of security controls monitoring, audit trails, reporting and deadline reminders, stretched teams can focus on the work that matters. This is just a small taste of what to expect in the coming 12 months. Security and compliance teams will no doubt face some formidable challenges over the year. Those best placed to ride them out will be the ones that view compliance as a journey of continuous improvement, not a once-a-year effort.
ISO 27001

State of Information Security Report: 11 Key Statistics and Trends for the Manufacturing and Utilities Industry

This year’s State of Information Security Report divulged the myriad challenges and opportunities that security leaders faced over the last 12 months. From supply chain management to addressing AI risk, the changing cyber threat landscape is forcing businesses to reassess and realign security priorities. Our respondents included over 160 security professionals working in the manufacturing and utilities industry across the US and the UK. Their responses shed light on the core information security threats the industry faces, the actions leaders have taken to address cyber challenges, and their priorities for building digital resilience over the next 12 months. Discover the top 11 information security statistics every manufacturing and utilities leader should know. Key Information Security Statistics for the Manufacturing and Utilities Industry Sophisticated Cyber Threats The rise of “as-a-Service” cyber threats e.g. Ransomware-as-a-Service, Phishing-as-a-Service) is the top information security challenge (46%) for manufacturing and utilities organisations. AI phishing and AI-generated misinformation and disinformation are the top emerging threat concerns for manufacturing and utilities organisations (40%). 40% of manufacturing and utilities businesses experienced phishing/vishing incidents in the last 12 months. Organisational Challenges 36% of manufacturing and utilities organisations say employees have used GenAI without organisational permission or guidance. 43% of manufacturing and utilities organisations say they adopted AI technology too quickly and are now facing challenges in scaling it back or implementing it more responsibly. Supply Chain 46% of manufacturing and utilities organisations have been impacted because of a cybersecurity or information security incident caused by a third-party vendor or supply chain partner in the last 12 months. 40% of manufacturing and utilities organisations require suppliers to be ISO 27001 certified; the same percentage require suppliers to be GDPR compliant. Information Security Priorities 90% of manufacturing and utilities organisations agree that every business should have someone responsible for information security at board level. Manufacturing and utilities organisations ranked improving incident response preparedness and recovery capabilities as their top information security priority (31%). AI Investment 70% of manufacturing and utilities organisations plan to increase their spend on AI and machine learning security applications. 98% of manufacturing and utilities organisations plan to invest in GenAI threat detection and defence in the next 12 months. The Cyber Threat Landscape While sophisticated AI-driven threats present an evolving challenge for organisations, long-standing methods of cyberattack are still drawing focus for manufacturing and utilities organisations. 40% of respondents from the industry stated their organisation had experienced phishing or vishing incidents in the last 12 months. Phishing in its latest, AI-powered form was also top of mind when we asked respondents to disclose their biggest emerging threat concerns. Respondents ranked AI phishing and AI-generated misinformation and disinformation as their top emerging threat concerns (both 40%). Similarly, manufacturing and utilities organisations cited the rise of “as-a-service” cyber threats like ransomware-as-a-service and phishing-as-a-service as the top information security challenge (46%) they currently face. Respondents ranked this challenge ahead of issues like the information security skills gap and securing emerging technologies such as AI, ML and blockchain (both 45%). These crime-as-a-service operations see expert crime groups act as service providers on behalf of benefactors, usually in exchange for payment or a portion of a payout. With the barrier to entry for would-be cybercriminals effectively removed, phishing and ransomware attacks are more accessible than ever for malicious actors. People and Process Challenges Challenges around AI management extend into how staff and even leadership teams are using and implementing the technology. More than one in three (36%) manufacturing and utilities respondents said employees have used generative AI (GenAI) without organisational permission or guidance. This ranked as the top employee information security mistake made by employees, closely followed by shadow IT (35%) and using personal devices for work purposes without proper security measures (34%). But employees aren’t the only ones jumping the gun when it comes to AI use; this approach extends to leadership teams. 43% of respondents said their organisation adopted AI technology too quickly and is now facing challenges in scaling it back or implementing it more responsibly. With AI technology advancing rapidly and businesses and individuals alike rushing to reap the benefits, guardrails for use and regulatory guidelines are still trailing behind. However, the EU AI Act, which is coming into effect in stages, requires AI providers to take appropriate measures to mitigate and manage AI system risk. For organisations implementing AI, the ISO 42001 standard provides best practice guidance for building a secure, ethical AI management system (AIMS) across AI system development, implementation, management and continuous improvement. Securing the Supply Chain Nearly half (46%) of the manufacturing and utilities organisations we surveyed said they’d been impacted because of a cybersecurity or information security incident caused by a third-party vendor or supply chain partner in the last 12 months. 15% had been impacted by multiple incidents. These organisations faced repercussions ranging from data breaches (43%) to business interruptions requiring emergency responses (36%). One in three (34%) experienced temporary system outages or operational disruption. With incidents targeting the supply chain becoming increasingly common, manufacturing and utilities businesses are treating supply chain and vendor security as a priority. Nearly four in five (79%) of manufacturing and utilities industry respondents said their organisation has strengthened third-party and vendor risk management in the last 12 months, and 19% said they plan to do so in the coming 12 months. 55% also plan to increase their spend on supply chain and third-party vendor security in the next 12 months. Businesses are also responding by requiring suppliers to evidence their information security and cybersecurity posture. 40% of manufacturing and utilities respondents require suppliers to be certified to the information security standard ISO 27001; the same percentage require GDPR compliance. AI management also remains a top priority in supply chain security – 35% of respondents said their organisation requires suppliers to be ISO 42001 certified. Information Security Priorities As businesses across the globe contend with the moving target that is the cyber threat landscape, manufacturing and utilities organisations are focusing on preparedness. Respondents ranked incident response preparedness and recovery capabilities as their top information security priority for the next 12 months (31%). This was followed by enhancing defences against AI-generated threats such as phishing and deepfakes (30%) and enhancing employee security awareness and behaviour (27%), both of which align with the top challenges and concerns noted by Report respondents. 90% of manufacturing and utilities respondents agreed that every business should have someone responsible for information security at board level, supporting the need for organisation-wide information security awareness. AI Threats and Opportunities Manufacturing and utilities businesses are leveraging AI for security while preparing to defend against the technology’s more nefarious uses. 70% of manufacturing and utilities businesses plan to increase their spend on AI and machine learning security applications, bolstering existing security posture and reducing the workload for often overloaded security and compliance teams. Additionally, 98% of manufacturing and utilities organisations plan to invest in GenAI threat detection and defence in the next 12 months. As mentioned, enhancing defences against AI-generated threats like deepfake and phishing ranked as respondents’ second highest information security priority. Here, strategic investment will put organisations in a stronger position to identify and defend against these threats. Looking Ahead Security leaders in the manufacturing and utilities industry are navigating a complex, set of information security challenges. However, their responses to this year’s Report show that they’re working strategically – identifying AI threats and opportunities, tightening supply chain security requirements, and working to improve employee information security awareness, from board-level to new starters. They’re building and implementing AI systems more securely and ethically and investing in improved information security measures. By proactively embedding information security best practices organisation-wide, manufacturing and utilities organisations can streamline their compliance efforts, grow customer trust, and improve digital resilience. We look forward to seeing how businesses in the sector have adapted to the changing cyber landscape in next year’s Report.

ISO 27001:2022 Annex A Controls

Organisational Controls

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

Ready to get started?