This entry might be using an old signature, or it was signed by a key that does not exist on the server.
[QUOTE="Niels, post: 519, member: 8"]Thank you for your application
Could you give us some examples?[/QUOTE]
ISO 27001/27002 encompasses a wide array of topics in the IT security space, so it will be difficult to touch on all of them here. It forms the basis of content security policies in the VFX industry, so we have implemented and are well-versed in all the best practices.
We plan on building and implementing an information security policy and a change management policy (both adapted from our Head of Technology's previous work). Additionally, we will have clear standard operating procedures, systems will be monitored, system data will be backed up off-site, network access to nodes will be controlled, logs will be recorded off-server, logs will be protected, and we will have a clear access policy.