{"id":239,"date":"2020-02-21T18:18:33","date_gmt":"2020-02-21T17:18:33","guid":{"rendered":"http:\/\/www.forensee.cz\/?page_id=239"},"modified":"2021-03-30T12:32:18","modified_gmt":"2021-03-30T10:32:18","slug":"rizeni-informacni-bezpecnosti","status":"publish","type":"page","link":"https:\/\/www.forensee.cz\/en\/rizeni-informacni-bezpecnosti\/","title":{"rendered":"Security of Information Management"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_image=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/dreamstime_xxl_154771088-2-Cropped.jpg&#8220; height=&#8220;500px&#8220; animation_style=&#8220;fade&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;32px||||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#ffffff&#8220; header_text_color=&#8220;#ffffff&#8220; header_font_size=&#8220;50px&#8220; header_2_text_color=&#8220;#ffffff&#8220; text_orientation=&#8220;center&#8220; header_font_tablet=&#8220;&#8220; header_font_phone=&#8220;&#8220; header_font_last_edited=&#8220;on|desktop&#8220; header_font_size_tablet=&#8220;45px&#8220; header_font_size_phone=&#8220;40px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; header_line_height_tablet=&#8220;1.3em&#8220; header_line_height_phone=&#8220;1.3em&#8220; header_line_height_last_edited=&#8220;on|tablet&#8220; header_2_font_tablet=&#8220;&#8220; header_2_font_phone=&#8220;&#8220; header_2_font_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;22px&#8220; header_2_font_size_phone=&#8220;20px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;1.3em&#8220; header_2_line_height_phone=&#8220;1.3em&#8220; header_2_line_height_last_edited=&#8220;on|tablet&#8220; header_text_shadow_style=&#8220;preset5&#8243; header_text_shadow_horizontal_length=&#8220;0.04em&#8220; header_text_shadow_vertical_length=&#8220;0.06em&#8220; header_2_text_shadow_style=&#8220;preset5&#8243;]<\/p>\n<h1><b>Security of Information Management<\/b><\/h1>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Information security not only according to ISO\/IEC 27 001<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;||-25px||false|false&#8220;][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;0px||||false|false&#8220;][et_pb_testimonial quote_icon_color=&#8220;#ff9500&#8243; _builder_version=&#8220;4.0.4&#8243; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; background_color=&#8220;rgba(0,0,0,0.04)&#8220; box_shadow_style=&#8220;preset1&#8243;]Jsme si v\u011bdomi hodnoty informac\u00ed a chceme pomoci s \u00fa\u010dinn\u00fdm \u0159\u00edzen\u00edm jejich bezpe\u010dnosti.[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_testimonial quote_icon_color=&#8220;#ff9500&#8243; _builder_version=&#8220;4.0.4&#8243; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; background_color=&#8220;rgba(0,0,0,0.04)&#8220; box_shadow_style=&#8220;preset1&#8243;]Pot\u0159ebujeme pomoct s implementac\u00ed syst\u00e9mu \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed dle ISO\/IEC 27 001 a s p\u0159\u00edpravou na certifikaci dle t\u00e9to normy.[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_testimonial quote_icon_color=&#8220;#ff9500&#8243; _builder_version=&#8220;4.0.4&#8243; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; background_color=&#8220;rgba(0,0,0,0.04)&#8220; box_shadow_style=&#8220;preset1&#8243;]Nem\u00e1me vhodn\u00e9ho pracovn\u00edka pro roli intern\u00edho auditora dle ISO\/IEC 27 001 nebo se n\u00e1m nevyplat\u00ed na tuto \u010dinnost n\u011bkoho zam\u011bstnat.[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.9.2&#8243; background_color=&#8220;rgba(0,0,0,0.07)&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; hover_enabled=&#8220;0&#8243; border_color_top=&#8220;#ff9500&#8243; border_color_bottom=&#8220;#ff9500&#8243; sticky_enabled=&#8220;0&#8243;][et_pb_row _builder_version=&#8220;4.9.2&#8243; custom_padding=&#8220;||24px|||&#8220; hover_enabled=&#8220;0&#8243; sticky_enabled=&#8220;0&#8243;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;16px&#8220; header_text_color=&#8220;#000000&#8243; header_2_font=&#8220;||||||||&#8220; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.3em&#8220; hover_enabled=&#8220;0&#8243; header_text_align=&#8220;justify&#8220; sticky_enabled=&#8220;0&#8243; text_orientation=&#8220;justified&#8220;]<\/p>\n<h2>ISMS<\/h2>\n<p>The documented ISMS (Information Security Management System), or information security management system, is a system that protects selected information assets through the analysis of possible risks and the subsequent implementation of measures that are continuously monitored. It may sound complicated, but this system is suitable for all organizations that work with information systems or information in general in any way. So for everyone. This means that ISMS can be used for both a company with a few employees and a multinational company. Large companies now have this system in place, while small ones often do not place enough emphasis on information security, and they begin to address security only when it is compromised. At the same time, information is often the most valuable asset of a company.<\/p>\n<p><span style=\"color: #000000;\"><strong>What if I don't want a certificate<\/strong><\/span><\/p>\n<p>There are a number of reasons to complete the process of ISMS implementation in the company in the form of certification - prestige, partner requirements or company policy. However, certification is by no means mandatory. For many companies, the essence of ISMS is important - the awareness that they have assets of a certain value and care about their security. And they do not require confirmation of this fact with a certificate. In many cases, even the information security management system can become more natural and is better and faster adopted in the organization. We are ready to cooperate with you on any project, whether its goal is to obtain certification according to ISO\/IEC 27 001 or \"just\" the implementation of basic rules and procedures of information security.<\/p>\n<p><span style=\"color: #000000;\"><strong><\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Implementation of the ISMS system according to ISO \/ IEC 27 001 with subsequent certification<\/strong><\/span><\/p>\n<p>If you decide to implement an information security management system in order to obtain certification according to ISO \/ IEC 27 001, we are ready to help you in all phases of implementation and certification. The initial step is a short comparative analysis, then we determine the current readiness of the organization and estimate the complexity of the entire project in your specific case accordingly.<\/p>\n<p>The first phase of the process then consists in mapping the organization's processes. This step is necessary so that we can jointly determine in which parts of the organization the ISMS system will be implemented and certified. In addition, the output from this section is universally applicable for further management of the organization. Very often, they reveal weaknesses in management, which the management of the organization - regardless of the ISMS system - can focus on.<\/p>\n<p>In the second step, the information assets of the organization are mapped. Based on the knowledge of processes and assets, a risk analysis can then be developed. This then serves as an input for a development of certain measures that will minimize those risks.<\/p>\n<p>We will help you prepare all the documentation - both the mandatory one, which is required for successful certification, and the optional one, which will help you apply the principles of ISMS in the practical life of the organization. It is a matter of course to provide training for employees if it proves to be necessary.<\/p>\n<p>In the last phase, we will help you prepare before and also during the certification itself. After successfully obtaining the certificate according to ISO \/ IEC 27 001, we are ready to help you meet the requirements of continuous improvement, non-compliance management and implementation of corrective measures.<\/p>\n<p><span style=\"color: #000000;\"><br \/><strong>ISMS internal auditor and ISMS manager<\/strong><\/span><\/p>\n<p>These positions are key and mandatory for a certified information security management system according to ISO \/ IEC 27 001. Our experts have the appropriate qualifications and are constantly educating themselves in the field. We will be happy to offer you their skills and experience for outsourcing these key roles.<\/p>\n<p>Performing a prescribed internal audit by an external auditor brings a number of benefits to the organization. The most important of these is to gain an objective view of the state of the ISMS system in the organization. This is important for the correct and timely adoption of corrective measures to identified nonconformities and to maintain the condition of continuous improvement for the non-certification audit. Secondly, there are cost savings, because only in the largest organizations is it worth to fill the position of ISMS auditor with a regular employee and ensure his continuous training in ISMS problematics.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;||||false|false&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; max_width=&#8220;250px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||-40px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#ffffff&#8220; header_text_color=&#8220;#ffffff&#8220; header_4_text_color=&#8220;#ffffff&#8220; header_4_font_size=&#8220;36px&#8220; background_color=&#8220;#ff9500&#8243; width=&#8220;100%&#8220; max_height=&#8220;1000px&#8220; custom_margin=&#8220;-65px||15px|400px|false|false&#8220; custom_margin_tablet=&#8220;|||240px|false|false&#8220; custom_margin_phone=&#8220;|||100px|false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;20px|15px|20px|15px|false|false&#8220; animation_style=&#8220;fade&#8220; border_color_all=&#8220;#ff9500&#8243;]<\/p>\n<h4><strong>Did you know that...<\/strong><\/h4>\n<p>Most of the most effective measures to increase information security are of a procedural nature and do not require the purchase of expensive software solutions?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;-28px||||false|false&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;16px&#8220; header_text_color=&#8220;#000000&#8243; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.3em&#8220; custom_margin=&#8220;-120px||||false|false&#8220; custom_margin_tablet=&#8220;-40px||||false|false&#8220; custom_margin_phone=&#8220;-10px||||false|false&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; header_2_font_tablet=&#8220;&#8220; header_2_font_phone=&#8220;&#8220; header_2_font_last_edited=&#8220;on|phone&#8220;]<\/p>\n<h2>We offer consulting<\/h2>\n<h2>in all phases of implementation<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;Stanoven\u00ed rozsahu a politky&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p>In the first steps, it is necessary to determine the area of the organization to which the ISMS will apply, only the most needed areas can be selected and thus avoid parts of the organization where it is not necessary. This is followed by the definition of a policy, which is a mandatory document and includes objectives, strategy and various types of requirements in the field of ISMS.\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;Vstupn\u00ed anal\u00fdza a anal\u00fdza rizik&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p>From the initial input analysis it is possible to deduce the current state of information security in the organization, and thus compile\u00a0<span>a proposal of measures to achieve the necessary goals for the implementation of ISMS. Risk analysis is a necessary part of the proposed measures, thanks to which risks can subsequently be minimized.\u00a0<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;N\u00e1vrh postup\u016f a jejich implementace&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p>Dal\u0161\u00edm z nezbytn\u00fdch krok\u016f implementace je vypracov\u00e1n\u00ed povinn\u00fdch dokument\u016f jako jsou normy, manu\u00e1ly, sm\u011brnice, nebo prohl\u00e1\u0161en\u00ed o aplikovatelnosti. Tyto dokumenty slou\u017e\u00ed pro zaveden\u00ed normy do praxe a jsou doprov\u00e1zeny dal\u0161\u00edmi d\u016fle\u017eit\u00fdmi \u00fakony, jako je nap\u0159\u00edklad \u0161kolen\u00ed zam\u011bstnanc\u016f.\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;Monitorov\u00e1n\u00ed a zlep\u0161ov\u00e1n\u00ed&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p>Dle normy je nezbytn\u00e9 monitorovat v\u00fdkonnost bezpe\u010dnosti informac\u00ed a efektivnost cel\u00e9ho syst\u00e9mu. D\u016fle\u017eit\u00fdm bodem je i normativn\u00ed po\u017eadavek o neust\u00e1l\u00e9m zlep\u0161ov\u00e1n\u00ed, dle kter\u00e9ho organizace mus\u00ed reagovat na neshody syst\u00e9mu a p\u0159ijmout nov\u00e1 n\u00e1pravn\u00e1 opat\u0159en\u00ed, aby syst\u00e9m byl neust\u00e1le efektivn\u00ed.\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;rgba(0,0,0,0.07)&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; border_color_top=&#8220;#ff9500&#8243; border_color_bottom=&#8220;#ff9500&#8243;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;||24px|||&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;16px&#8220; header_text_color=&#8220;#000000&#8243; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.3em&#8220; hover_enabled=&#8220;0&#8243; text_orientation=&#8220;justified&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<h2>Cyber Security Law<\/h2>\n<p>Act No. 181\/2017 Coll., On Cyber Security, as amended, aims to improve cooperation between the private and public sectors in the field of cyber security. Its implementing regulations define a number of entities to which this Act imposes obligations that largely comply with the requirements of the ISO \/ IEC 27 001 standard, on which this regulation is based.<\/p>\n<p>We are ready to provide cooperation and support to the entities affected by the Cyber Security Act in the implementation of the necessary measures, the creation of related documentation and the filling of the roles required by law in the cyber security system.<\/p>\n<p>In particular, outsourcing the role of the Cyber Security Auditor brings the organization the advantage of cost savings, when this role does not have to be filled by a regular employee, at the same time the organization gains independent insight into its cyber security management system.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; custom_margin=&#8220;50px||0px||false|false&#8220; animation_style=&#8220;fade&#8220;][et_pb_row column_structure=&#8220;1_3,2_3&#8243; _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_image src=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/tech-19.jpg&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.0.4&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;2_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#ffffff&#8220; text_font_size=&#8220;16px&#8220; header_2_text_color=&#8220;#ffffff&#8220; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.5em&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; hover_enabled=&#8220;0&#8243; text_orientation=&#8220;justified&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<h2><strong>Case Study<\/strong><\/h2>\n<p><strong>Client:<\/strong>\u00a0Energetics supplier<\/p>\n<p><strong>Problem:<\/strong>\u00a0The company's rapid growth has significantly increased the value of information assets and outgrown the capabilities of internal IT management<\/p>\n<p><strong>Our solution:<\/strong><\/p>\n<p>A former client, for whom we dealt with secure data disposal in the past, turned to us for a consultation in the field of information systems security. Right after the introductory meeting, it was clear that the rapid growth of the family business now being a key player in the market was not followed by corresponding changes in the way IT was managed in general, information security was not addressed at all.<\/p>\n<p>In the first phase, we performed an input analysis for the client to give the company's management a better idea of the current state of the organization. Subsequently, the scope of the project and the implementation period in the horizon of 10 months was proposed and approved. Due to the fact that the client is not heading for certification according to ISO \/ IEC 27 001, this time is sufficient.<\/p>\n<p>The project was started by mapping the processes of the organization and its assets. The subsequent risk analysis was concluded with a proposal of measures that responded to the identified risks. Although it was not a preparation for certification, the basic documentation for the ISMS and related implementation documents were prepared in agreement with the client.<\/p>\n<p>In the organization, after the end of the project, we perform regular annual audits of the ISMS system and we also provide ongoing training for key employees.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_image src=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/DSC06489-2-1.jpg&#8220; _builder_version=&#8220;4.0.4&#8243; max_height=&#8220;460px&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_team_member name=&#8220;Mari\u00e1n Svetl\u00edk&#8220; position=&#8220;Vedouc\u00ed konzultant&#8220; _builder_version=&#8220;4.0.4&#8243; header_font=&#8220;|600|||||||&#8220; header_text_color=&#8220;#000000&#8243; header_font_size=&#8220;25px&#8220; position_text_color=&#8220;#000000&#8243; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;100px||0px||false|false&#8220;][\/et_pb_team_member][et_pb_text _builder_version=&#8220;4.0.4&#8243; header_2_font_size=&#8220;20px&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Do you need a consultation in the field of information security management?<\/h2>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;%%238%%&#8220; icon_color=&#8220;#ff9500&#8243; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.0.4&#8243; body_text_color=&#8220;#ff9500&#8243; body_font_size=&#8220;20px&#8220; body_link_text_color=&#8220;#ff9500&#8243;]<\/p>\n<p><a href=\"mailto:svetlik@forensee.cz\">svetlik@forensee.cz<\/a>\u00a0<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;%%264%%&#8220; icon_color=&#8220;#ff9500&#8243; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.0.4&#8243; body_text_color=&#8220;#ff9500&#8243; body_font_size=&#8220;20px&#8220; body_link_text_color=&#8220;#ff9500&#8243;]<\/p>\n<p>+420 776 740 482<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti &nbsp; &nbsp; Informa\u010dn\u00ed bezpe\u010dnost nejen dle ISO\/IEC 27 001Jsme si v\u011bdomi hodnoty informac\u00ed a chceme pomoci s \u00fa\u010dinn\u00fdm \u0159\u00edzen\u00edm jejich bezpe\u010dnosti.Pot\u0159ebujeme pomoct s implementac\u00ed syst\u00e9mu \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed dle ISO\/IEC 27 001 a s p\u0159\u00edpravou na certifikaci dle t\u00e9to normy.Nem\u00e1me vhodn\u00e9ho pracovn\u00edka pro roli intern\u00edho auditora dle ISO\/IEC 27 001 nebo se [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-239","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti - nejen dle ISO\/IEC 27 00 - forensee<\/title>\n<meta name=\"description\" content=\"Dokumentovan\u00fd syst\u00e9m ISMS (Information Security Management System), neboli syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed je syst\u00e9m, kter\u00fd chr\u00e1n\u00ed...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forensee.cz\/en\/rizeni-informacni-bezpecnosti\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti - nejen dle ISO\/IEC 27 00 - forensee\" \/>\n<meta property=\"og:description\" content=\"Dokumentovan\u00fd syst\u00e9m ISMS (Information Security Management System), neboli syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed je syst\u00e9m, kter\u00fd chr\u00e1n\u00ed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forensee.cz\/en\/rizeni-informacni-bezpecnosti\/\" \/>\n<meta property=\"og:site_name\" content=\"forensee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/forensee\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-30T10:32:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@forensee\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/\",\"url\":\"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/\",\"name\":\"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti - nejen dle ISO\/IEC 27 00 - forensee\",\"isPartOf\":{\"@id\":\"https:\/\/www.forensee.cz\/#website\"},\"datePublished\":\"2020-02-21T17:18:33+00:00\",\"dateModified\":\"2021-03-30T10:32:18+00:00\",\"description\":\"Dokumentovan\u00fd syst\u00e9m ISMS (Information Security Management System), neboli syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed je syst\u00e9m, kter\u00fd chr\u00e1n\u00ed...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/www.forensee.cz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forensee.cz\/#website\",\"url\":\"https:\/\/www.forensee.cz\/\",\"name\":\"forensee\",\"description\":\"\u0158e\u0161en\u00ed a slu\u017eby v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed\",\"publisher\":{\"@id\":\"https:\/\/www.forensee.cz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forensee.cz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forensee.cz\/#organization\",\"name\":\"forensee\",\"url\":\"https:\/\/www.forensee.cz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png\",\"contentUrl\":\"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png\",\"width\":300,\"height\":75,\"caption\":\"forensee\"},\"image\":{\"@id\":\"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/forensee\",\"https:\/\/twitter.com\/forensee\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti - nejen dle ISO\/IEC 27 00 - forensee","description":"Dokumentovan\u00fd syst\u00e9m ISMS (Information Security Management System), neboli syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed je syst\u00e9m, kter\u00fd chr\u00e1n\u00ed...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forensee.cz\/en\/rizeni-informacni-bezpecnosti\/","og_locale":"en_US","og_type":"article","og_title":"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti - nejen dle ISO\/IEC 27 00 - forensee","og_description":"Dokumentovan\u00fd syst\u00e9m ISMS (Information Security Management System), neboli syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed je syst\u00e9m, kter\u00fd chr\u00e1n\u00ed...","og_url":"https:\/\/www.forensee.cz\/en\/rizeni-informacni-bezpecnosti\/","og_site_name":"forensee","article_publisher":"https:\/\/www.facebook.com\/forensee","article_modified_time":"2021-03-30T10:32:18+00:00","twitter_card":"summary_large_image","twitter_site":"@forensee","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/","url":"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/","name":"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti - nejen dle ISO\/IEC 27 00 - forensee","isPartOf":{"@id":"https:\/\/www.forensee.cz\/#website"},"datePublished":"2020-02-21T17:18:33+00:00","dateModified":"2021-03-30T10:32:18+00:00","description":"Dokumentovan\u00fd syst\u00e9m ISMS (Information Security Management System), neboli syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed je syst\u00e9m, kter\u00fd chr\u00e1n\u00ed...","breadcrumb":{"@id":"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forensee.cz\/rizeni-informacni-bezpecnosti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/www.forensee.cz\/"},{"@type":"ListItem","position":2,"name":"\u0158\u00edzen\u00ed informa\u010dn\u00ed bezpe\u010dnosti"}]},{"@type":"WebSite","@id":"https:\/\/www.forensee.cz\/#website","url":"https:\/\/www.forensee.cz\/","name":"forensee","description":"\u0158e\u0161en\u00ed a slu\u017eby v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed","publisher":{"@id":"https:\/\/www.forensee.cz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forensee.cz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forensee.cz\/#organization","name":"forensee","url":"https:\/\/www.forensee.cz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/","url":"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png","contentUrl":"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png","width":300,"height":75,"caption":"forensee"},"image":{"@id":"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/forensee","https:\/\/twitter.com\/forensee"]}]}},"_links":{"self":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":55,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":1784,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/239\/revisions\/1784"}],"wp:attachment":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/media?parent=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}