Detailing the Major Structural Changes in ISO27002:2022

Presented by

Gareth Haken, Principal Analyst at the ISF

About this talk

Join Gareth Haken, Principal Analyst at the ISF on Thursday 3rd March at 13:00 GMT where he will present the key changes in the new ISO/IEC 27002:2022 release. Gareth will also highlight how the ISF has aligned the changes to the new release of the Standard of Good Practice 2022, which will be published at the end of the March to ISF Members. The webinar will cover: • the key changes to ISO/IEC 27002:2022, with a focus on the reduction of controls • how the Standard of Good Practice 2022 has been aligned to ISO/IEC 27002:2022. Gareth is a Principal Analyst in the Tools and Methodologies team. He is the current lead author for the SOGP 2022, having carried out the same role for the SOGP 2020. His areas of expertise include software development, cyber-crime investigation and some of the more technical elements of information security, such as malware investigation and network analysis. Gareth has also completed a MSc Degree in Information Security and authored a research paper on the Security of Apple Pay, which in 2017 was presented at the 3rd ACM Cyber-Physical System Security Workshop in Abu Dhabi. Gareth has worked for a variety of organisations before taking employment with the ISF, including The British Army, National Crime Agency and British Telecom.

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (126)
Subscribers (20378)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user