• Home
  • Services
    • vCISO
    • Risk Assessments
    • Strategies, Governance & Frameworks
    • Security Testing
    • Security & Privacy Compliance
    • Incident Management
  • Resources
    • Blog
    • Frameworks
      • NIST CSF
      • ISO 27001:2022
      • GDPR
      • PCI DSS
      • CBJ
      • NCA ECC
      • SAMA CSF
      • PDPL KSA
      • Qatar NIA
      • Qatar PDPPL
      • Dubai ISR
      • ISO22301
      • CST CRF
  • Company
    • About us
    • Contact Us
    • Careers
    • Partners
    • Customers

Welcome to

Cyberatos Blog

 

Explore the Cyberatos blog for in-depth articles on cybersecurity best practices, emerging threats, and practical solutions to safeguard your digital assets.

‹ Back

ISO 27001

 

  1. CIS Controls and ISO 27001 (simple mapping)
  2. Information Security, Cybersecurity, and Privacy Protection, Compass Assurance Services.
  3. IS0IEC 27001 Implementation Guide, by CERTIKIT.
  4. ISO 27001 CHECKLIST TEMPLATE
  5. ISO 27001 Information Security Management System 10-Step Guide.
  6. ISO 27001 RISK ASSESSMENT TEMPLATE.
  7. ISO 27001-2022 Audit Charter, InfoseTrain
  8. ISO 27001:2022 Audit Finding Report, by Ayaz Sabir.
  9. ISO 27001:2022 Controls Made Easy - Part 1, by MOS.
  10. ISO 27001:2022 Controls Made Easy - Part 2, by MOS.
  11. ISO 27001:2022 Controls Made Easy - Part 3, by MOS.
  12. ISO 27001:2022 Controls Mapping to Information Security Control Domains, by MOS.
  13. ISO 270012022 KPI Metrics, by Ayaz Saber.
  14. ISO27001-2013 to ISO27001-2022 Transition Guide, by MOS.
  15. ISO27001-Statement of Applicability, by MOS.
  16. ISO27001-The complete Playbook, by SPRINTO.

 

https://www.cst.gov.sa/en/regulations-and-licenses/regulations

© 2025 Cyberatos Consultancy

Privacy Policy