Select regional store:
PAS 555:2013 Cyber Security Risk Governance and Management

PAS 555 2013 Cyber Security Risk Governance and Management Specification

SKU: 4246
Publishers: BSI
Format: Hardcopy
Published: 20 May 2013
Availability: In Stock

PAS 555:2013 is an outcomes-based, holistic approach to cyber security.

Price: $127.00


PAS 555:2013 Cyber Security Risk Governance and Management Specification

PAS 555 supplies a holistic framework for effective cyber security which not only considers the technical aspects, but also the related physical, cultural and behavioural aspects of an organisation’s approach to addressing cyber threats, including effective leadership and governance.

Through this approach, PAS 555 enables organisations to:

  • focus investment in the most appropriate way, minimising potential losses and improving operational effectiveness and efficiency;
  • develop organisational resilience by improving loss prevention and incident management;
  • identify and mitigate cyber security risk throughout the organisation.

PAS 555 applies to the whole organisation and its supply chain, avoiding the dangers that can arise when the security measures fail to cover the whole of the business. It is an adaptable approach which can apply to any organisation, whatever its size or type, whether commercial, not-for-profit or public sector.

PAS 555’s flexibility allows an organisation to utilise its own defined processes or the adoption of other standards and management systems to achieve its intended cyber security ends. PAS 555 can be used alone, but is also compatible with many major security standards, such as ISO20000-1, ISO27001, ISO22301 and ISO31000.

Click to expand full contents »

1. Scope
2. Terms and definitions
3. Management structure
4. Commitment to a cyber security culture
5. Security context
6. Business architecture strategy
7. Capability development strategy
8. Supplier and partner strategy
9. Technology strategy
10. Business resilience
11. Compliance with legislation and other standards
12. Risk assessment
13. Protection and mitigation
14. Detection and response
15. Recovery
16. Compliance analysis and continual improvement

Customer Reviews

(0# of Ratings:)
This website uses cookies. View our cookie policy