catalog
Please complete the inquiry form to access eBook details
-
-
What is social engineering? An explanation of the main techniques and countermeasures!
Contact this catalog
-
-
What is the ISMS (ISO 27001) certification mark? Let's understand the conditions and precautions for using the logo.
Contact this catalog
-
What are the characteristics of industries that have obtained ISMS? What should be noted? We will answer various questions!
Contact this catalog
-
-
-
What if you get infected with a "Trojan horse"? How is it different from a virus?
Contact this catalog
-
What is the duration and required documents for the ISMS audit? An explanation of cases where the audit may fail and how to address them.
Contact this catalog
-
What is the typical cost of consulting for obtaining ISMS certification? An explanation along with tips for comparison!
Contact this catalog
-
-
What is malware? An explanation of its types, infection routes, and measures that should be taken within companies.
Contact this catalog
-
-
-
Block suspicious emails! What are effective measures against targeted attack emails?
Contact this catalog
-
What is a targeted attack? What should you do to prepare for the worst-case scenario?
Contact this catalog
-
-
-
-
What is the cloud security certification that has been frequently heard about lately?
Contact this catalog
-
-
Which one should you obtain? A clear explanation of the differences between ISMS (ISO 27001) and P Mark (JIS Q 15001)!
Contact this catalog
-
What is the cloud security certification that has been frequently heard about lately? <ISMS>
Contact this catalog
-
How to conduct information security training for ISMS? Introducing usable materials and examples of internal training.
Contact this catalog
-
[Video Distribution] Special release of the video for the "Introduction Seminar on International Standard ISO 42001 (AI Management System Certification)"
Contact this catalog
-
-
-
-
-