What Is an Information Security Policy? An information security policy defines what an organisation needs to protect and to what standard. It applies to everyone who handles the organisation’s…
Łukasz Krzewicki
Explore all publications and insights
What Is ISO 22301? ISO 22301 defines what a business continuity management system (BCMS) needs to include. At its core, the standard calls for a business impact analysis, documented continuity plans,…
What Are SOC Audits? A SOC audit is an independent assessment of the internal controls at a service organisation. Its purpose is to give the organisation’s clients confidence that appropriate…
What Is a Control Measure? A control measure is a specific action, procedure, or safeguard designed to limit risk and help an organisation achieve its objectives. It is not a synonym for internal…
What Is Inherent Risk? Inherent risk is the level of threat linked to an activity, process, or asset before any controls are applied. It is driven by the nature of the activity itself, not by how…
NIS2 Requirements for Incident Management The NIS2 Directive obliges organisations to detect incidents promptly, limit their impact, and meet strict reporting timelines. It also requires the entire…
In this environment, companies need structured and reliable ways to protect their data and prove resilience. ISO/IEC 27001, one of the most widely adopted international standards, provides a…
What is Risk and Control Self-Assessment (RCSA)? RCSA is a structured process that allows teams across an organisation to identify risks, evaluate the controls in place, and assess their…
Definitions first. According to COSO, internal control is a set of processes and actions that help a company meet its goals, whether that means running efficiently, reporting accurately, or staying…
From digital transformation and regulatory changes to disruptions in global supply chains, companies face ever more complex challenges that shape the reality of doing business. Volatility brings…
