0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.17.1.2: Implementing Information Security Continuity
Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/20/25 Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/20/25

A.17.1.2: Implementing Information Security Continuity

Establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for information security during an adverse situation.

Read More
A.17.1.1: Planning Information Security Continuity
Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/19/25 Continuity, Management, Disaster Recovery, Recovery, Emergency Jeremy Pickett 2/19/25

A.17.1.1: Planning Information Security Continuity

Include information security continuity in the organization’s business continuity management systems.

Read More
—A.7.2.1: Management Responsibilities
Employment, Workforce, Management Jeremy Pickett 10/17/24 Employment, Workforce, Management Jeremy Pickett 10/17/24

—A.7.2.1: Management Responsibilities

Require management to ensure that employees and contractors apply information security in accordance with established policies and procedures.

Read More
Information Security in Project Management
Project, Management, Process, Policy, Schedule Jeremy Pickett 10/10/24 Project, Management, Process, Policy, Schedule Jeremy Pickett 10/10/24

Information Security in Project Management

Include information security in the management of projects.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC