• FlagEnglish
    FlagFrançais
    Flagالعربية
    FlagDutch
    FlagEnglish

ISO277012025 - What’s New

The newly released ISO/IEC 27701:2025 marks a major shift in how organizations approach privacy and data protection. As the first update since 2019, this version introduces significant structural and functional changes — including its transformation from an extension of ISO 27001 to a standalone standard for Privacy Information Management Systems (PIMS).

In this session, we’ll break down:
🔹 Key updates and differences in the 2025 version
🔹 What the standalone structure means for implementation and certification
🔹 Transition guidance for organizations currently certified under 27701:2019
🔹 How the revised standard aligns with evolving privacy regulations and global frameworks
🔹 Practical steps to get your privacy management system ready
Governing AI Responsibly: A Practical Guide to ISO/IEC 42001 14
Jan

Governing AI Responsibly: A Practical Guide to ISO/IEC 42001

As artificial intelligence becomes deeply embedded in business operations, organizations must ensure that AI systems are governed responsibly, transparently, and in line with emerging regulatory and ethical expectations. This webinar provides a practical introduction to ISO/IEC 42001, the international standard for Artificial Intelligence Management Systems (AIMS). The session will focus on how organizations can structure AI governance, manage AI-related risks, and establish controls that support trustworthy and compliant AI use. Key topics include: - Why AI governance is critical for modern organizations - Overview of ISO/IEC 42001 and its core requirements - AI risk management and governance controls - Roles, responsibilities, and accountability in AI systems - Practical steps toward implementing an AI Management System (AIMS) 🎯 Who should attend: CISOs, risk and compliance professionals, IT managers, data and AI leaders, auditors, and decision-makers involved in AI adoption and governance.

Read More
Penetration Testing Beyond Compliance: Finding Real Risk 07
Jan

Penetration Testing Beyond Compliance: Finding Real Risk

Penetration testing is often treated as a compliance requirement — but real security goes much deeper. In this session, we will explore how penetration testing can be used as a strategic security tool to identify real attack paths, prioritize risk, and strengthen defensive controls. The webinar will focus on practical insights drawn from real-world engagements, highlighting the difference between compliance-driven testing and risk-driven testing. Key topics include: - Compliance vs. real-world penetration testing - Identifying exploitable vulnerabilities and attack chains - Translating technical findings into business risk - Common misconceptions about penetration testing - Using test results to improve security posture 🎯 Who should attend: CISOs, IT managers, security professionals, auditors, and anyone responsible for protecting organizational assets.

Read More