GISF: Are information security controls compatible with all legal and legislative needs?

Information security management systems (ISMS) are made up of controls, processes, plans, and policies that are continually updated as security needs change, damage costs compound quickly and legislative delays can hold resources from communities in need of aid and response. In addition, as part of the risk management process, organizations select and apply security controls for information and information systems.

Want to check how your GISF Processes are performing? You don’t know what you don’t know. Find out with our GISF Self Assessment Toolkit: