It’s Time to Examine Your ISO 27002 Compliance

SystemExperts has been helping organizations of all sizes comply with the controls prescribed in ISO 27002*

*SystemExperts can also assess you against ISO 27001, Management Controls

Are you ISO 27002 Compliant?

Please select a valid form

One of our consultants will get back to you shortly

ISO 27002 standards and guidelines help organizations implement, maintain, and improve information security management. But you need the help of experts to ensure implementation and compliance is done right. The team at SystemExperts ensures your organization will meet the best practices and international standards of ISO 27002, setting you up for success and letting you focus on what’s important.

ISO 27002 Compliance Program

SystemExperts helps organizations implement the following:

  • Develop a security program that integrates business and technology
  • Identify and prioritize specific tasks to improve security and achieve compliance
  • Focus on activities that reduce real business risk
  • Position companies to meet the security requirements of the General Data Protection Regulation (GDPR), Sarbanes-Oxley, Gramm-Leach-Bliley, HIPAA, PCI, and other pertinent regulations
  • Improve cross-functional (e.g. Legal, HR, lines of business) cooperation on security matters
  • Identify deficiencies in security areas that are often overlooked
  • Develop a risk-based view of security that includes secure business processes, well designed policies, and appropriate use of technology
  • Communicate to prospective customers, business partners, directors, employees, and regulators that the organization has a comprehensive, ISO 27002 compliant security program in place

Additional ISO 27002 Compliance Services

  • ISO 27002 Immersion Sessions – Conducting a one day comprehensive workshop to help organizations understand the ISO 27002 security requirements in their business context
  • Compliance Preparation – Providing advice and assistance with implementing a ISO 27002 compliant information security program
  • Security Awareness Training – Developing and delivering Security and Privacy Awareness Training
  • Vendor Risk Management Reviews – Performing ISO 27002 assessments on service providers and other third parties to ensure that they have sound security practices.

Our Step-by-Step ISO 27002 Assessment

  1. Determine scope of project and target timeline
  2. Assess current ISO 27002 compliance status
  3. Provide guidance for sustainable and ongoing compliance programs
  4. Provide ISO 27002 Compliance Letter

SystemExperts PCI Consulting Step-by-Step Approach

  • Identify business and client data, including cardholder information
  • Analyze the boundaries of cardholder data environment
  • Assess the operating controls that protect the confidentiality and integrity of all cardholder data against the PCI requirements
  • Provide guidance on remediation activities that achieve cost-effective compliance with the PCI requirements
  • Assist with the completion of the PCI Attestation of Compliance
  • Provide a PCI Compliance Certification Letter

Getting Started is Easy

    1. Scope the project and schedule a start date
    2. Kick off the project with a Conference Call
    3. Enumerate with a Network Discovery & IP Services Inventory
    4. Perform the Vulnerability Assessment and provide the report
    5. Review the report with your team
    6. Provide the Testing Certification Letter

What is the ISO 27002 Framework?

ISO 27002 is widely recognized as the industry best practice security framework for organizing security activities. Its controls ensure that critical resources are identified, risks are understood, appropriate policies exist, and administrative and technical controls are in place. The ISO 27002 framework also provides the elements necessary to achieve compliance with the growing set of regulatory requirements, including the Payment Card Industry Data Security Standard (PCI-DSS) and Federal and state regulations such as the Health Information Portability and Accountability Act (HIPAA), Sarbanes Oxley, and Gramm Leach Bliley.

The SystemExperts Difference

SystemExperts is comprised solely of senior-level experts, with successful track records managing a wide range of projects, and establishing long-term partnerships with our clients. We over-deliver and provide unmatched personal attention. Our focus is on what’s important based on our clients’ business needs. We distill problems to their root causes and recommend what’s appropriate for you.

We’ve been in business since 1994 helping clients see the big picture and design solutions to meet organizations’ comprehensive security needs.

IP Services Inventory

Larger organizations often lose track of the IP-based services they have on their network. Periodic scanning of address space enables you to better manage your exposure by highlighting unnecessary security vulnerabilities.

As part of our penetration testing services, SystemExperts scans your IP address space for IP-based services. For each IP address scanned, we look for services available on all TCP and well-known UDP ports. We categorize whether service is open (reachable) or closed (unreachable). Once testing is complete, you receive a table containing the IP Services Inventory.

You may choose to remove any unexpected/unnecessary services we find during the scan. After adjusting your list, you can provide us with a re-scan list. We then rescan the IP addresses on the list and update the IP Services Inventory table to reflect changes.

Firewall Review

Firewall rules tend to grow gradually in layers. Changes to the rules are made to support the evolving needs of the business and by nature accumulate over time. The result of this process is too often:

  • The rule set grows too large to be readily understood
  • Later rules contradict the earlier rules
  • A particular business need that required a specific opening in the firewall no longer exists, but the opening remains as a historical artifact.

We work with you to document how the firewall should function and review the configuration to determine if it is consistent with the expected behavior.

It’s Time to Examine Your ISO 27002 Compliance

SystemExperts has been helping organizations of any size comply with all of the controls prescribed in ISO 27002

Are you ISO 27002 Compliant?

Please select a valid form

One of our consultants will get back to you shortly