The ISO 27001 standard for information security is intended to assist organisations
implement and then continually improve information security. Because of the constantly
changing threat landscape, this continual improvement is vital to maintain adequate
levels of information security protection. A proven model for achieving continual
improvement is the Plan, Do, Check, Act cycle. Trusted Cyber recommends this approach
and has extensive experience in assisting organisations in all phases of this cycle.
Plan (establish the ISMS):
Do (implement and operate the ISMS):
Check (monitor and review the ISMS):
Act (maintain and improve the ISMS):