<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/cobit/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #CoBIT</title><description>Lifu Technologies - Blog #CoBIT</description><link>https://www.lifutechnologies.co.za/blogs/tag/cobit</link><lastBuildDate>Thu, 16 Apr 2026 13:31:43 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[One of the Proven Ways to Stay Compliant to Global Standards (CYNOMI)]]></title><link>https://www.lifutechnologies.co.za/blogs/post/one-of-the-proven-ways-to-stay-compliant-to-global-standards-cynomi</link><description><![CDATA[Cynomi streamlines cybersecurity for vCISOs, automating compliance, assessments, and reporting across clients with real-time insights and audit ready results.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EZeUq0OuSyaAQV8usfqhKA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_vfZK6-XJSGSTtQ7yhyapiQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zmWV2OhOTbSC5LXpyBvxuw" data-element-type="column" data-animation-name="fadeIn" data-animation-repeat="true" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zplight-section zplight-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_zmWV2OhOTbSC5LXpyBvxuw"].zpelem-col{ border-style:dotted; border-color:#000000 !important; border-width:1px; } @media (min-width:992px) { [data-element-id="elm_zmWV2OhOTbSC5LXpyBvxuw"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_jIWKbua-R8Go89OC7r8r2A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>How Cynomi Helps vCISOs Keep Organizations Compliant, Faster, and Smarter</span></span></h2></div>
<div data-element-id="elm_HGOLIyc9GcoZapzrIOQeXQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HGOLIyc9GcoZapzrIOQeXQ"] .zpimage-container figure img { width: 900px !important ; height: 400px !important ; } } [data-element-id="elm_HGOLIyc9GcoZapzrIOQeXQ"] .zpimage-container figure figcaption .zpimage-caption-content { font-family:'Poppins'; font-weight:400; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-thin " src="/Images/compliance-wall-looker-760.jpg" size="custom" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content">Ever thought of how easy it is to stay compliant? Try Cynomi!</span></figcaption></figure></div>
</div><div data-element-id="elm_CMt_BQ59QKK9pHw4npvUlw" data-element-type="text" class="zpelement zpelem-text zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-no zpbackground-attachment-fixed " data-animation-name="bounceIn"><style> [data-element-id="elm_CMt_BQ59QKK9pHw4npvUlw"].zpelem-text { background-image: url(/Images/powerpoint-blue-background-2mh01myupijfzqv7-657251598.jpg); } </style><div class="zptext zptext-align-justify zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div></div><div style="text-align:justify;"><div style="text-align:justify;"><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span>Staying on top of global cybersecurity rules like ISO 27001, NIST, GDPR, HIPAA, and others isn’t just about passing audits. It’s about building stronger, more secure organizations. For virtual CISOs (vCISOs) and cybersecurity service providers managing multiple clients, the real challenge is doing this efficiently without getting overwhelmed.<br/><span style="font-weight:bold;"><br/><span style="font-size:18px;">That’s where Cynomi comes in.</span><span style="font-size:18px;"><br/></span></span></span></span></div></div><div style="text-align:justify;"><div style="text-align:justify;"><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span>Cynomi is a powerful yet easy-to-use cybersecurity platform designed to help vCISOs streamline security and compliance across all their clients. Instead of juggling spreadsheets, policies, and scan reports, Cynomi brings everything together in one place automating the hard parts and making compliance manageable.<br/><br/><span style="font-weight:bold;font-size:18px;">Here’s how Cynomi works:</span></span></span><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span><span style="font-weight:bold;"><span style="font-size:18px;"><br/></span></span></span></span><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span><span style="font-weight:bold;">Smart Security Assessments&nbsp;<br/></span>Cynomi starts with a simple questionnaire to understand a client’s current setup. Based on the answers, it automatically creates follow-up assessments to build a full picture of their security health. Clients can even complete parts themselves, giving them ownership while the vCISO stays in control.<br/><br/><span style="font-weight:bold;">Custom Policies in Minutes&nbsp;<br/></span>After the assessment, Cynomi generates clear, tailored security policies for each organization. These include the purpose, key requirements, and a score (from 1 to 10) showing how strong they are. Policies can be adjusted based on the client’s risk tolerance, so they’re practical and aligned with business goals.<br/><br/><span style="font-weight:bold;">Find Real Risks with Integrated Scans&nbsp;<br/></span>Cynomi supports several types of technical scans to uncover actual vulnerabilities:<br/>1. External scans check for open ports, SSL issues, and DNS security.<br/>2. Internal scans assess password policies, patch levels, and admin access.<br/>3. You can also import results from tools like Nessus or Qualys.<br/>4. Microsoft 365 security data can be synced directly.<br/>&nbsp;<br/><span style="font-weight:bold;">Turn Gaps into Actionable Tasks&nbsp;<br/></span>Instead of drowning in compliance checklists, Cynomi turns gaps into a simple to-do list. Each task includes: step-by-step guidance, priority level (Critical to Low), estimated effort, and option to upload proof (like PDFs or screen shots). Tasks can be grouped into short-, mid-, or long-term plans, helping you create realistic road maps that fit client budgets and team capacity.<br/><br/><span style="font-weight:bold;">Stay Audit-Ready with One Click&nbsp;<br/></span>Need to prove compliance? Just select the frameworks you’re targeting like NIST, ISO 27001, or CMMC and Cynomi automatically maps your work to the required controls. You can:<br/>1. See compliance status at a glance<br/>2. Drill into specific requirements<br/>3. Generate professional, audit-ready reports instantly<br/><br/><span style="font-weight:bold;">Clear Dashboards and Reports&nbsp;<br/></span>The central dashboard shows your client's security posture in real time:<br/>1. A Posture Score (0–10) gives an overall health rating<br/>2. A readiness heat map highlights weak areas<br/>3. Open tasks and scan findings are clearly listed</span></span><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span><br/></span></span><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span><br/>With Cynomi, you can also generate key reports for executives or board meetings as these will make it easy to show value and progress to stakeholders.<br/>1. Full Report: Summary of risks and action plans<br/>2. Risk Mitigation Plan: Shows progress over time<br/>3. Risk Findings Report: Includes a benchmarked Risk Score compared to industry peers<br/><br/><span style="font-weight:bold;">Why vCISOs Choose Cynomi&nbsp;<br/></span></span></span></div></div><div style="text-align:justify;"><span style="font-family:&quot;Georgia&quot;, serif;color:rgb(11, 35, 45);"><span>Manage multiple clients from one platform&nbsp;<br/>Automate assessments, policies, and reporting&nbsp;<br/>Show measurable improvements with scores and time lines&nbsp;<br/>Align security with business needs&nbsp;<br/>Always stay audit-ready&nbsp;<br/><br/><span style="font-weight:bold;">What to remember!&nbsp;</span><br/>Cynomi isn’t just another compliance tool. It’s a complete cybersecurity operating system built for vCISOs and MSPs. By automating the repetitive work and simplifying complex standards, it frees up time to focus on what really matters reducing risk and helping clients become more secure.<br/><br/>Whether you're guiding a small company through GDPR or helping a growing firm meet CMMC requirements, Cynomi makes it faster, smarter, and easier with full visibility every step of the way.</span></span></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 05 Aug 2025 15:52:12 +0200</pubDate></item><item><title><![CDATA[CoBIT 5, ITIL V3, ISO 27001  Information Security Management System and ISO 9001 Quality Management System]]></title><link>https://www.lifutechnologies.co.za/blogs/post/cobit-5-itil-v3-iso-27001-information-security-management-system-and-iso-9001-quality-management-sys</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/ISO-27001-768x660-2644051505.png"/>CoBIT 5, ITIL V3, ISO 27001 – Information Security Management System and ISO 9001 Quality Management System]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_AYXMTws1TX6NUCzWy9jzMg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_O3nlov8KQjKDVIBwpYFQzA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8Mygw7pwQ2e4iktb74DIoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5pWTyceOT7uJVMPOjGVWfA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5pWTyceOT7uJVMPOjGVWfA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><span style="font-size:11pt;">LIFU Technologies is delighted to share that <span style="text-decoration:underline;"><a href="https://www.linkedin.com/in/glenard-o-moore-096a42264/" title="Glenard O'Moore" target="_blank" rel="">Glenard O'Moore</a></span> has joined us to offer certification services like ISO 27001 and 9001. Glenard has also been appointed CISO for Lifu Technologies.</span><style>@font-face {}@font-face {}p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif }.MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif }.MsoPapDefault { margin-bottom: 8pt; line-height: 107% }div.WordSection1 { page: WordSection1 }</style></div></div></h2></div>
<div data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"] .zpimage-container figure img { width: 200px ; height: 171.88px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"] .zpimage-container figure img { width:200px ; height:171.88px ; } } @media (max-width: 767px) { [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"] .zpimage-container figure img { width:200px ; height:171.88px ; } } [data-element-id="elm_U8xcbMEyLUqZvCKVCgRDKg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/ISO-27001-768x660-2644051505.png" width="200" height="171.88" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_O3qWv1eYRJuHaJcZ1kb48g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_O3qWv1eYRJuHaJcZ1kb48g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p><span>Glenard has more than 15 years’ experience in implementing and Auditing “Best Practice” Frameworks, and Standards such as CoBIT 5, ITIL V3, ISO 27001 – Information Security Management System and ISO 9001 Quality Management System</span></p><p><span>Qualifications:</span></p><p><span>Certified ITIL Expert</span></p><p><span>Certified CoBIT Assessor</span></p><p><span>Certified ISO 27001 Lead Auditor</span></p><p><span>Certified ISO 9001 Lead Auditor</span></p><p><span>DevOps Practioner</span></p><p><span><br></span></p><p><span style="font-style:italic;">References include:&nbsp;</span></p><p><span>Implementation of ITIL in the Ministry of Finance and Office of the Prime Minister in Namibia where 16 Government Employees were trained and Certified as ITIL Experts</span></p><p><span><br></span></p><p><span>Establishment of GRC in accordance with Public Service Administration in Namibia <br></span></p><p><span><br></span></p><p><span>In collaboration with DD Limpopo, establishment of DPSA CGICT defined Core Practices at the then, newly established Collins Chabane Local Municipality</span></p><p><span><br></span></p><p><span>Implementation of ISO 27001 Information Security Management for QR-Connect in the Netherlands and Zafehouze ApS in Denmark. <br></span></p><style>@font-face {}@font-face {}p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif }.MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif }.MsoPapDefault { margin-bottom: 8pt; line-height: 107% }div.WordSection1 { page: WordSection1 }</style></div>
<p></p></div></div><div data-element-id="elm_gI1pl5tIRNypSocHsPnNHg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_gI1pl5tIRNypSocHsPnNHg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Jan 2024 12:45:51 +0200</pubDate></item><item><title><![CDATA[What is the difference between ISO 27001 and SOC?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/cobit-5-itil-v3-iso-27001-information-security-management-system-and-iso-9001-quality-management-sys1</link><description><![CDATA[CoBIT 5, ITIL V3, ISO 27001 – Information Security Management System and ISO 9001 Quality Management System]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0Qa6FU8GR8GIehzpT9EhOQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KdD1flFUS-iS9yC6qMOr6Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_anp9Wc_JTguWP_R0uS4ovg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_izJe-N-yS6emTFw0FJSW-A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p><span>ISO 27001 is the&nbsp;<b>Standard</b>&nbsp;that establishes requirements for an Information Security Management System (ISMS), a set of practices to define, implement, operate, and improve information security. </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>While SOC refers to&nbsp;<b>a set of audit reports</b>&nbsp;to evidence the level of Conformity of Information Security Controls’ design and operation against a set of defined criteria (TSC), </span></p></div></h2></div>
<div data-element-id="elm_WrLIy1SmTiejKULOjM9tnA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p align="center" style="text-align:center;"><b><span style="font-size:14pt;">Comparison between ISO 27001:2022 and SOC</span></b></p><p align="center" style="text-align:center;"><span style="font-size:5pt;">&nbsp;</span></p><p><span>ISO 27001:2022 Revision defines requirements and Controls for the systematic Protection of Information, including PII which are Applicable to Organizations/Entities of any size across Industries that require Compliance with the Standard. </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>The Information Security Management System (ISMS), defined in Clauses 4 through 10 of the Standard, provides Directives to Organizations/Entities as to provide Guidance to ensure its Security Compliance are aligned with identified/adopted objectives and outcomes (eradication/mitigation of Threats as a result of incidents, operational optimization, etc.), predicated upon an EFFECTIVE Risk Management approach.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>What is the relationship between ISO 27001:2022 and SOC?</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>ISO 27001 has at a minimum the following controls that can be used to comply with the Trust Services Criteria:</span></p><img src="/Compare%20between%20ISO%2027001%20and%20SOC%20.png"><br><span style="font-size:5pt;">&nbsp;</span><p><b><span>ISO 27001 vs SOC</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>It is not a question of whether ISO 27001 vs. SOC 2, as SOC is an Audit report, while ISO 27001 is a Standard to establish an Information Security Management System (ISMS)</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>Hence SOC can be considered as an output, delivered by an ISO 27001 ISMS Implementation.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>In effect the appropriate relationship between ISO 27001 and SOC is as follows: </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>1.ISO 27001 Certification is not Mandatory to create an SOC report</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>2.The ISMS can provide, without major additional cost and effort, a solid basis for preparing this report, whilst increasing Clients/Customers’ confidence that the Organization can <b>Protect their Information/Data</b>.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>What is the difference between ISO 27001 and SOC?</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>ISO 27001 is the&nbsp;<b>Standard</b>&nbsp;that establishes requirements for an Information Security Management System (ISMS), a set of practices to define, implement, operate, and improve information security. </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><span>While SOC refers to&nbsp;<b>a set of audit reports</b>&nbsp;to evidence the level of Conformity of Information Security Controls’ design and operation against a set of defined criteria (TSC), </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>Definition.</span></b><span>&nbsp;</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 is a Standard that establishes requirements for an Information Security Management System (ISMS).</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC refers to a set of audit reports to evidence the level of conformity to a set of defined criteria (TSC), </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>Applicability by industry.</span></b><span>&nbsp;</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 – for Organizations of any size or industry.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC 2 – for Service Organizations from any industry, </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>Compliance</span></b><b><span style="font-size:11.5pt;">.</span></b><span style="font-size:11.5pt;">&nbsp;</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 is certified by ISO certification body.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC 2 is attested by a licensed Certified Public Accountant (CPA), </span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p><b><span>What are the Objectives?</span></b></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>ISO 27001 – to define, implement, operate, control, and improve overall security.</span></p><p><span style="font-size:5pt;">&nbsp;</span></p><p style="margin-left:36pt;"><span>SOC 2 is intended to prove Security level of Systems against static principles and criteria</span></p><style>@font-face {}@font-face {}@font-face {}p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif }p.MsoFooter, li.MsoFooter, div.MsoFooter { margin: 0cm; font-size: 11pt; font-family: "Calibri", sans-serif }p.MsoNoSpacing, li.MsoNoSpacing, div.MsoNoSpacing { margin: 0cm; font-size: 11pt; font-family: "Calibri", sans-serif }span.FooterChar { }.MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif }.MsoPapDefault { margin-bottom: 8pt; line-height: 107% }div.WordSection1 { page: WordSection1 }ol { margin-bottom: 0cm }ul { margin-bottom: 0cm }</style></div><p>.</p></div>
</div><div data-element-id="elm_IGp5G6MiSnmNXxO1Vw3F7Q" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Jan 2024 12:45:51 +0200</pubDate></item><item><title><![CDATA[ISO 27001 - NIST - CoBIT - Integrated Framework Model]]></title><link>https://www.lifutechnologies.co.za/blogs/post/ISO-27001-NIST-CoBIT-Integrated-Framework-Model</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/logo_medium_resolution.png"/>amely ISO 27001, the leading ISO standard for Information Security Management; COBIT, an IT management and Governance Framework; and NIST SP 800 series, a set of documents published by the United States government iro IT Technology Security, to which ISO 62443 (IoT) will be added]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jpO1tKuKTTOjhnc9SXJ9iw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2HIZ5DIuSeuoK5XUxnr9eQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ij3dE_uKSPKUEMA2u8vkQQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dFTuLpF7QBGMU2jFiqhy9g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dFTuLpF7QBGMU2jFiqhy9g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Executive Summary<br></h2></div>
<div data-element-id="elm_c-CXQFTaQ8W2G9tjsz497g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_c-CXQFTaQ8W2G9tjsz497g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:11pt;">The increase in concern among businesses and customers about protecting their information has led to more complex security requirements, many times involving the integration of multiple approaches. </span></p><p><span style="font-size:11pt;">In turn, modern information security implementation projects have become even more challenging, especially information technology processes. </span></p><p><span style="font-size:11pt;">And, when we talk about integrating approaches, it is not a question of simply creating a single list of what each approach requires and implementing them, but rather to coordinate these requirements, through trade-offs between conflicting objectives and alternatives, and by reinforcing the common ones, so that the implemented requirements can meet the expected overall outcomes. </span></p><p><span style="font-size:11pt;">Therefore, before ensuring compliance with requirements, it is paramount to consider a process of integrating security practices into business activities, but strange as it may seem, there are not many readily available materials regarding integrating practices. </span></p><p><span style="font-size:11pt;">Our approach embraces the three areas, namely ISO 27001, the leading ISO standard for Information Security Management; COBIT, an IT management and Governance Framework; and NIST SP 800 series, a set of documents published by the United States government iro IT Technology Security, to which ISO 62443 (IoT) will be added </span></p><p><span style="font-size:11pt;">We will present their similarities and differences, and how they can be used together during an information security implementation project to improve information protection. <br></span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-style:italic;">The Paper is written by <a href="https://www.linkedin.com/in/glenard-o-moore-096a42264/" title="Glenard O'Moore" target="_blank" rel="">Glenard O'Moore</a>, CISO of Lifu Technologies and certified auditor on various standards<br></span></p><p></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_y3Hzsrp7SnKlG3cpaFF-nA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_y3Hzsrp7SnKlG3cpaFF-nA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%2027001%20NIST%20CoBIT.pdf" download><span class="zpbutton-content">Read the paper</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 10 Jan 2024 12:31:28 +0200</pubDate></item></channel></rss>