[{"id":2068,"link":"https:\/\/iso270012022.com\/iso-270012022-and-third-party-risk-management-a-comprehensive-guide\/","name":"iso-270012022-and-third-party-risk-management-a-comprehensive-guide","thumbnail":{"url":false,"alt":false},"title":"ISO 27001:2022 and Third-Party Risk Management: A Comprehensive Guide","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"Jun 9, 2024","dateGMT":"2024-06-09 14:47:27","modifiedDate":"2024-06-09 15:47:38","modifiedDateGMT":"2024-06-09 14:47:38","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":8,"sec":45},"status":"publish","excerpt":""},{"id":2066,"link":"https:\/\/iso270012022.com\/common-challenges-in-iso-27001-implementation-and-how-to-overcome-them\/","name":"common-challenges-in-iso-27001-implementation-and-how-to-overcome-them","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/DSLR-camera-at-200-display-5-scaled.jpg","alt":"DSLR camera at 200 display"},"title":"Common Challenges in ISO 27001 Implementation and How to Overcome Them","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 27, 2024","dateGMT":"2024-05-27 14:23:32","modifiedDate":"2024-05-27 15:23:37","modifiedDateGMT":"2024-05-27 14:23:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001\/' rel='post_tag'>ISO 27001<\/a><a href='https:\/\/iso270012022.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a>"},"readTime":{"min":14,"sec":6},"status":"publish","excerpt":""},{"id":2063,"link":"https:\/\/iso270012022.com\/a-step-by-step-guide-to-achieving-iso-27001-certification\/","name":"a-step-by-step-guide-to-achieving-iso-27001-certification","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/DSLR-camera-at-200-display-4-scaled.jpg","alt":"DSLR camera at 200 display"},"title":"A Step-by-Step Guide to Achieving ISO 27001 Certification","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 27, 2024","dateGMT":"2024-05-27 13:31:51","modifiedDate":"2024-05-27 14:31:56","modifiedDateGMT":"2024-05-27 13:31:56","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001-certification\/' rel='post_tag'>ISO 27001 certification<\/a><a href='https:\/\/iso270012022.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a>"},"readTime":{"min":14,"sec":39},"status":"publish","excerpt":""},{"id":2060,"link":"https:\/\/iso270012022.com\/what-is-iso-27001-and-why-is-it-crucial-for-your-business\/","name":"what-is-iso-27001-and-why-is-it-crucial-for-your-business","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/red-padlock-on-black-computer-keyboard-2-scaled.jpg","alt":"red padlock on black computer keyboard"},"title":"What is ISO 27001 and Why is it Crucial for Your Business?","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 27, 2024","dateGMT":"2024-05-27 13:28:21","modifiedDate":"2024-05-27 14:28:27","modifiedDateGMT":"2024-05-27 13:28:27","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001\/' rel='post_tag'>ISO 27001<\/a>"},"readTime":{"min":12,"sec":49},"status":"publish","excerpt":""},{"id":2057,"link":"https:\/\/iso270012022.com\/iso-27001-vs-other-security-standards-which-is-right-for-your-business\/","name":"iso-27001-vs-other-security-standards-which-is-right-for-your-business","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/red-padlock-on-black-computer-keyboard-1-scaled.jpg","alt":"red padlock on black computer keyboard"},"title":"ISO 27001 vs. Other Security Standards: Which is Right for Your Business?","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 24, 2024","dateGMT":"2024-05-24 14:25:45","modifiedDate":"2024-05-24 15:25:49","modifiedDateGMT":"2024-05-24 14:25:49","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/cybersecurity-standards\/' rel='post_tag'>Cybersecurity Standards<\/a><a href='https:\/\/iso270012022.com\/tag\/data-protection\/' rel='post_tag'>data protection<\/a><a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a>"},"readTime":{"min":13,"sec":15},"status":"publish","excerpt":""},{"id":2053,"link":"https:\/\/iso270012022.com\/step-by-step-process-to-achieve-iso-27001-certification\/","name":"step-by-step-process-to-achieve-iso-27001-certification","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/DSLR-camera-at-200-display-3-scaled.jpg","alt":"DSLR camera at 200 display"},"title":"Step-by-Step Process to Achieve ISO 27001 Certification","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 24, 2024","dateGMT":"2024-05-24 14:21:12","modifiedDate":"2024-05-24 15:21:17","modifiedDateGMT":"2024-05-24 14:21:17","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001-certification\/' rel='post_tag'>ISO 27001 certification<\/a><a href='https:\/\/iso270012022.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a>"},"readTime":{"min":14,"sec":51},"status":"publish","excerpt":""},{"id":2050,"link":"https:\/\/iso270012022.com\/top-10-benefits-of-iso-27001-certification-for-businesses\/","name":"top-10-benefits-of-iso-27001-certification-for-businesses","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/DSLR-camera-at-200-display-2-scaled.jpg","alt":"DSLR camera at 200 display"},"title":"Top 10 Benefits of ISO 27001 Certification for Businesses","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 24, 2024","dateGMT":"2024-05-24 14:17:55","modifiedDate":"2024-05-24 15:18:00","modifiedDateGMT":"2024-05-24 14:18:00","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001-certification\/' rel='post_tag'>ISO 27001 certification<\/a><a href='https:\/\/iso270012022.com\/tag\/risk-management\/' rel='post_tag'>risk management<\/a>"},"readTime":{"min":14,"sec":13},"status":"publish","excerpt":""},{"id":2047,"link":"https:\/\/iso270012022.com\/what-is-iso-27001-a-comprehensive-guide-to-information-security-management-systems\/","name":"what-is-iso-27001-a-comprehensive-guide-to-information-security-management-systems","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/DSLR-camera-at-200-display-1-scaled.jpg","alt":"DSLR camera at 200 display"},"title":"What is ISO 27001? A Comprehensive Guide to Information Security Management Systems","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 24, 2024","dateGMT":"2024-05-24 14:14:17","modifiedDate":"2024-05-24 15:14:22","modifiedDateGMT":"2024-05-24 14:14:22","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/cybersecurity\/' rel='post_tag'>cybersecurity<\/a><a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001\/' rel='post_tag'>ISO 27001<\/a>"},"readTime":{"min":13,"sec":39},"status":"publish","excerpt":""},{"id":2044,"link":"https:\/\/iso270012022.com\/iso-27001-understanding-and-implementing-information-security-management-systems\/","name":"iso-27001-understanding-and-implementing-information-security-management-systems","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/DSLR-camera-at-200-display-scaled.jpg","alt":"DSLR camera at 200 display"},"title":"ISO 27001: Understanding and Implementing Information Security Management Systems","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 12, 2024","dateGMT":"2024-05-12 12:01:44","modifiedDate":"2024-05-12 13:01:44","modifiedDateGMT":"2024-05-12 12:01:44","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/isms\/' rel='post_tag'>ISMS<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-27001\/' rel='post_tag'>ISO 27001<\/a>"},"readTime":{"min":7,"sec":10},"status":"publish","excerpt":""},{"id":2042,"link":"https:\/\/iso270012022.com\/the-importance-of-annex-a-15-2-managing-supplier-service-development\/","name":"the-importance-of-annex-a-15-2-managing-supplier-service-development","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/a-tall-brick-building-with-blue-shutters-and-windows-scaled.jpg","alt":"a tall brick building with blue shutters and windows"},"title":"The Importance of Annex A.15.2: Managing Supplier Service Development","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 12, 2024","dateGMT":"2024-05-12 11:58:37","modifiedDate":"2024-05-12 12:58:37","modifiedDateGMT":"2024-05-12 11:58:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/annex-a-15-2\/' rel='post_tag'>Annex A.15.2<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-iec-27001\/' rel='post_tag'>ISO\/IEC 27001<\/a><a href='https:\/\/iso270012022.com\/tag\/supplier-services\/' rel='post_tag'>supplier services<\/a>"},"readTime":{"min":2,"sec":51},"status":"publish","excerpt":""},{"id":2040,"link":"https:\/\/iso270012022.com\/ensuring-information-security-in-supplier-relationships-annex-a-15-1\/","name":"ensuring-information-security-in-supplier-relationships-annex-a-15-1","thumbnail":{"url":"https:\/\/iso270012022.com\/wp-content\/uploads\/2024\/05\/red-padlock-on-black-computer-keyboard-scaled.jpg","alt":"red padlock on black computer keyboard"},"title":"Ensuring Information Security in Supplier Relationships: Annex A.15.1","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 12, 2024","dateGMT":"2024-05-12 11:57:05","modifiedDate":"2024-05-12 12:57:05","modifiedDateGMT":"2024-05-12 11:57:05","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/information-security\/\" rel=\"category tag\">Information Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/supplier-management\/' rel='post_tag'>supplier management<\/a><a href='https:\/\/iso270012022.com\/tag\/supplier-relationships\/' rel='post_tag'>supplier relationships<\/a>"},"readTime":{"min":3,"sec":45},"status":"publish","excerpt":""},{"id":2038,"link":"https:\/\/iso270012022.com\/enhancing-third-party-risk-management-with-iso-iec-270012022\/","name":"enhancing-third-party-risk-management-with-iso-iec-270012022","thumbnail":{"url":false,"alt":false},"title":"Enhancing Third-Party Risk Management with ISO\/IEC 27001:2022","author":{"name":"aarbi4712","link":"https:\/\/iso270012022.com\/author\/aarbi4712\/"},"date":"May 12, 2024","dateGMT":"2024-05-12 11:54:20","modifiedDate":"2024-05-12 12:54:20","modifiedDateGMT":"2024-05-12 11:54:20","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/iso270012022.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>","space":"<a href=\"https:\/\/iso270012022.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/iso270012022.com\/tag\/information-security\/' rel='post_tag'>information security<\/a><a href='https:\/\/iso270012022.com\/tag\/iso-iec-270012022\/' rel='post_tag'>ISO\/IEC 27001:2022<\/a><a href='https:\/\/iso270012022.com\/tag\/third-party-risk-management\/' rel='post_tag'>third-party risk management<\/a>"},"readTime":{"min":2,"sec":40},"status":"publish","excerpt":""}]