- Company: Texas based cybersecurity vendor with 312 employees.
- Specialty: Providers of a comprehensive, unified Network Threat Detection Security Tool
- Requirement: Needed ISO 27001 certification for their growing list of clients throughout the U.S. and Europe.
- What We Provided: Successfully performed a gap assessment, developed all required security and operational policies and procedures, developed a customized continuous monitoring program, along with finding a credible ISO 27001 certification body with MorganHill’s ISO 27001 RFP services.
- End Result: Obtained ISO 27001 certification from an accredited ISO ANAB body that I recommend to them.
Customer Testimonial: “Their process was efficient, straightforward, and easy to follow, and their templates saved us an immense amount of time in terms of developing all required documentation”
Talk to MorganHill today and Get the Answers You Need
Scope: We'll help you define important scoping parameters.
Documentation: We'll help you develop all required policies and procedures.
Guidance: We'll guide you through the ISO/IEC process from start to finish.
One Price: Our fees for all services are fixed.
Wherever you are in North America, Europe, Africa, or Asia, MorganHill is ready to assist.
Expertise: Since 2006, we have been an industry leader for ISO/IEC.
Knowledge: We've worked with every ISO/IEC standard currently in print.
Industry: We've worked in every major industry/sector.
Navigating the Complexities of FBI CJIS Security Policy: How MorganHill Consulting Group, LLC Can Guide You
In an era where data security is paramount, compliance with the FBI CJIS Security Policy has become a critical necessity for organizations handling criminal justice information (CJI). The FBI Criminal Justice Information Services (CJIS) Security Policy provides stringent guidelines to protect sensitive information and maintain the integrity of criminal justice operations. At MorganHill Consulting Group, LLC, we specialize in navigating these complexities, offering comprehensive consulting and advisory services to ensure your organization achieves and maintains compliance.
ISO/IEC 27002:2022 | 5.9 - Inventory of Information and Other Associated Assets
Per ISO/IEC 27002:20222 | 5.9 - Information Security in Project Management, “The organization should identify its information and other associated assets and determine their importance in terms of information security. Documentation should be maintained in dedicated or existing inventories as appropriate.”
ISO/IEC 27002:2022 | 5.12 - 5.13 - Classification & Labelling of Information
Per ISO/IEC 27002:20222 | 5.12 - Classification of Information, “Information should be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements. Additionally, per ISO/IEC 27002:2022 - Labelling of Information, “An appropriate set of procedures for information labelling should be developed and implemented in accordance with the information classification scheme adopted by the organization.”
ISO/IEC 27002:2022 | 5.10 - Acceptable Use of Information | Email Usage Policy
Per ISO/IEC 27002:20222 | 5.10 - Acceptable Use of Information and Other Associated Assets “Personnel and external party users using or having access to the organization’s information and other associated assets should be made aware of the information security requirements for protecting and handling the organization’s information and other associated assets.”