catalog
Please complete the inquiry form to access eBook details
-
-
Examples of what constitutes personal information under the P Mark, categorized by industry.
Contact this catalog
-
-
-
-
-
-
-
-
-
[Video Distribution] Special release of the video for the "Introduction Seminar on International Standard ISO 42001 (AI Management System Certification)"
Contact this catalog
-
How to conduct information security training for ISMS? Introducing usable materials and examples of internal training.
Contact this catalog
-
What is the cloud security certification that has been frequently heard about lately? <ISMS>
Contact this catalog
-
Which one should you obtain? A clear explanation of the differences between ISMS (ISO 27001) and P Mark (JIS Q 15001)!
Contact this catalog
-
-
Thorough explanation of symptoms, countermeasures, and prevention methods in case of malware infection!
Contact this catalog
-
-
What is the cloud security certification that has been frequently heard about lately?
Contact this catalog
-
-
-
-
-
What is a targeted attack? What should you do to prepare for the worst-case scenario?
Contact this catalog
-
Block suspicious emails! What are effective measures against targeted attack emails?
Contact this catalog
-
Explaining key points of business card management that companies obtaining the P mark should keep in mind!
Contact this catalog
-
What rules should companies with P Mark certification follow for password management?
Contact this catalog
-
-
What does "operation verification" mean in the P Mark? What is the difference from "internal audit"?
Contact this catalog
-
-