A.5.7
Threat Intelligence
Stay informed about potential cyber threats you can better protect against them.
Endpoint Security
A.8.12
Data leakage prevention
Put measures in place to stop sensitive information from leaking out, either intentionally or by mistake.
Email Security
A.8.16
Monitoring activities
Regularly keep an eye on systems and activities to quickly spot and respond to any unusual or suspicious behaviour.
Endpoint Detection & Response Network
A.5.26
Response to information security incidents
Information security incidents shall be responded to in accordance with the documented procedures.
Endpoint Detection & Response
A.6.3
Information security awareness, education and training
Personnel shall receive appropriate security training and updates relevant to their job functions.
Security Awareness Training
A.8.7
Protection against malware
Protection against malware shall be implemented and supported by appropriate user awareness.
Endpoint Security, Endpoint Detection & Response
A.8.20
Networks security
Networks and network devices shall be secured, managed and controlled to protect information in systems and applications.
Network
A.5.34
Privacy and protection of personal identifiable information (PII)
Meeting the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations.
User Data Governance