ISO and IEC procedural documentation
(the Journal contains articles about the standards developed by SC 27 from working group experts)
- Volume 1, Issue 1 March 2021 – Information Security Management Systems
- Volume 1, Issue 2 July 2021 – Security Controls and Services
- Volume 1, Issue 3 Feb 2022 – Cryptography and Security Mechanisms
- Volume 2, Issue 1 March 2022 – International 27001 Day
- Volume 2, Issue 2 July 2022 – ISO/IEC 27002:2022
- Volume 3, Issue 1 January 2023 - International 27001 Day
- Volume 3, Issue 2 July 2023 - 27001 business experiences conference
- Volume 3, Issue 3 Sept 2023 – SC 27 Officer Interviews
- Volume 3, Issue 4 Oct 2023 – Auditing Practice Articles
- Volume 4, Issue 1 February 2024 – Cybersecurity Awareness and Education
- Volume 4, Issue 2 June 2024 – Technology, Security and Privacy
SC 27 WG1 JOURNAL
(the Journal contains articles about the standards developed by SC 27 WG1 from working group experts)
- Volume 1, Issue 1 Oct 2023 – WG 1 Historical Account
- Volume 1, Issue 2 Nov 2023 – Meet the WG 1 Officers
SC27 Committee Documents (General information about SC 27 activities and reference information)
- SC27 committee document 11 - Overview of SC 27 Structure, Members and Work Programme
- SC 27 committee document 12 - Assessment of cryptographic techniques and key lengths
- SC 27 committee document 205 - Process for inclusion and deletion of Cryptographic Mechanisms
- SC 27 committee document 206 - Guidelines for effective communications on security
- SC 27 committee document 207 - Conversion Functions
- SC 27 committee document 208 - Post-Quantum Cryptography
- SC 27 committee document 501 - WG 5 Roadmap
- SC 27 committee document 502 - Privacy References List
- SC 27 committee document 504 - Standards Privacy Assessment
- ISO 27402: Ensuring Security and Privacy in the Evolving Landscape of IoT Devices
- What is cryptography?
- Ways to incorporate cyber resilience into your business
- What’s new in cyber security
- Counterattacks on cyber security
- Keeping consumers and citizens safe and secure (2021-05-06)
- The cybersecurity skills gap (2021-04-15)
- Protecting our privacy in smart cities (2021-02-18)
- Keeping cybersafe (2021-02-16)
- Biometric security (2021-01-14)
- Keeping an eye on information security (2020-12-16)
- Getting big on data (2020-11-05)
- Keeping cyberspace safe for 30 years (2020-10-02)
- Safe, secure and private, whatever your business (2020-05-04)
- How Microsoft makes your data its priority (2020-03-10)
- Guidance for information security management systems auditors just updated (2020-01-27)
- Its all about trust (2019-11-11)
- Are we safe in the internet of things? (2019-09-05)
- Tackling privacy information management head on: first international standard just published (2019-08-06)
- Stronger data protection with updated guidelines on assessing information security controls (2019-02-04)
- Cracking down on cyber challenges in the latest ISO Focus (2019-01-10)
- How to tackle todays IT security risks (2019-01-10)
- How to measure the effectiveness of information security (2016-12-16)
- Common terminology for information security management just revised (2016-02-18)
- Security toolbox protects organizations from cyber-attacks (2015-12-17)
- IT security experts win technical excellence award (2015-09-17)
- Safeguard your information with new IT security collection (2013-11-18)
- Are you prepared for information security breaches? new ISO/IEC 27001 can help (2013-10-04)
- New version of ISO/IEC 27001 to better tackle IT security risks (2013-08-14)
- Safeguarding the Internet of Things
- Reinforcing the cyber security of IoT devices
- Cyber security for industrial Internet platforms
- Cyber security: addressing internet security issues and mitigating common security threats
- Cyber security: strengthening information security in supply chains
- How cyber security standards help remove technical barriers to trade
- Cyber security for IT and OT supply chains (2021-02-03)
- Securing IT and OT supply chains with international standards and conformity assessment (2021-02-01)
- Effective governance is the key to cyber security
- Eight things organizations should do to ensure compliance with cyber security regulations