ISO 27001 Internal Audit Training – Beyond the Checklist | Consalta

How do you turn ISO 27001 training into real audit readiness? We took one team through the full journey—practical, focused, and full of lessons you don’t often hear...

ISO 27001 and DORA Compliance: How Closely Aligned Are They?

Already using ISO 27001 or thinking about it? See how it puts you 80% on the path to DORA compliance—and what steps you still need to take...

New Personal Data Protection Law in B&H and ISO 27701

Bosnia and Herzegovina adopts a new Personal Data Protection Law. Find out how it aligns with ISO 27701 and what it means for your organization's compliance...

Avoiding Common Pitfalls in ISO 27001 Implementation

“By failing to prepare, you are preparing to fail.” These words from Benjamin Franklin are especially meaningful when implementing ISO 27001. The standard’s generalized and flexible structure is...

Helping Sarajevo Airport Set a New Standard in Data Privacy

Let’s face it—protecting personal data is no small task, especially if you’re a large organization like Sarajevo International Airport. With a mix of international and local travelers passing through...

Integrating Management Systems – A Strategic Advantage

Integrating ISO 9001, 27001, 22301, and 20000 offers a streamlined approach to management, where each standard complements the others. ISO 9001 (Quality Management) sets the foundational framework for...

First Steps: Setting Objectives for Your ISMS

One of the initial steps in implementing ISO 27001 is setting clear objectives for your Information Security Management System (ISMS). These objectives provide direction for your security efforts and...

First Steps: Performing a Risk Assessment 

A critical early step in implementing ISO 27001 is conducting a risk assessment. This process helps identify the potential risks to your organization’s information assets and evaluate the...

First steps: Conducting a Gap Analysis

Before jumping into the full ISO 27001 implementation process, it’s important to conduct a gap analysis. A gap analysis compares your organization’s current information security measures against the...
Scroll to Top