{"id":27723,"date":"2024-08-07T11:57:03","date_gmt":"2024-08-07T14:57:03","guid":{"rendered":"https:\/\/www.neomind.com.br\/?p=27723"},"modified":"2024-08-07T13:13:03","modified_gmt":"2024-08-07T16:13:03","slug":"iso-27001-everything-you-need-know","status":"publish","type":"post","link":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/","title":{"rendered":"ISO 27001: Everything You Need to Know"},"content":{"rendered":"\n<p>ISO 27001 is a regulatory standard that helps companies keep information safe. In an increasingly interconnected world, information is considered one of the most valuable assets a company can have.<\/p>\n\n\n\n<p>Undeniably, data security is a recurring concern, especially to ensure consumer trust and business continuity.<\/p>\n\n\n\n<p>The standards and guidelines provided by ISO 27001 focus on the protection of confidential data. This includes not only personal data but also financial information, intellectual property, and any other sensitive data.<\/p>\n\n\n\n<p>Learn how to keep your company&#8217;s confidential data safe. Understand everything about ISO 27001.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>What is ISO 27001 and What Does It Regulate?<\/h2>\n\n\n\n<p>ISO 27001 is an internationally recognized standard for information security management, offering a set of practices and guidelines to ensure confidential data protection.<\/p>\n\n\n\n<p>Published by ISO in partnership with IEC, it is a standard suitable for <strong>establishing, implementing, operating, monitoring, reviewing, maintaining, and continuously improving an Information Security Management System (ISMS)<\/strong>.<\/p>\n\n\n\n<p>This system provides a comprehensive view of security brought by technology in data protection. ISMS offers insights into practices related to telecommunications, physical environment protection, business continuity, licensing, among others.<\/p>\n\n\n\n<p>Thus, it aims to establish processes and procedures to mitigate and <a href=\"https:\/\/www.neomind.com.br\/en\/blog\/risk-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">manage organizational risks<\/a>. The guidelines must be adapted to each organization and its specificities, considering mainly the technological and organizational environment.<\/p>\n\n\n\n<p>The main topics covered by ISO 27001 include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Risk analysis<\/li><li>Information security policies<\/li><li>Security controls (access identification, network security, and encryption)<\/li><li>Periodic audits and reviews to ensure efficiency and effectiveness<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"https:\/\/conteudo.neomind.com.br\/ing-bpm-in-risk-management?utm_source=blog&amp;utm_medium=organic&amp;utm_campaign=bpm-risk-management\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"670\" height=\"114\" src=\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/Banner-p_-artigo.png\" alt=\"\" class=\"wp-image-27736\" srcset=\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/Banner-p_-artigo.png 670w, https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/Banner-p_-artigo-300x51.png 300w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>What Are the Benefits of ISO 27001?<\/h2>\n\n\n\n<p>Adopting ISO recommendations prepares businesses to act and mitigate possible threats to data. Companies of different sizes that adopt ISO 27001 benefit from:<\/p>\n\n\n\n<p>Identification and mitigation of information security risks with Risk Management<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Protection of sensitive data<\/li><li>Regulatory compliance<\/li><li>Increased trust from customers, suppliers, partners, and investors<\/li><li>Enhanced confidentiality, availability, and integrity of data<\/li><li>Improved and consistent decision-making<\/li><li>Implementation of management controls for process optimization<\/li><li>Efficiency and operational performance gains<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Implementing the Standard in My Company<\/h2>\n\n\n\n<p>Implementing ISO 27001 is a valuable initiative to ensure data protection and earn the certification seal. To achieve this, several steps are required:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Defining the Implementation Team<\/h3>\n\n\n\n<p>First, define which employees will form the implementation team and who will be responsible for the project. A leader should be appointed to oversee and implement the ISMS. The selected team members must have in-depth knowledge of information security as well as the guidelines and requirements of ISO 27001.<\/p>\n\n\n\n<p>It will be necessary to develop a project plan outlining the goals, time required, and investments. Management and strategic levels of the company must be involved.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Scope of the ISMS<\/h3>\n\n\n\n<p>Before drafting the scope, determine what type of information needs protection. This approach is specific to each company and involves identifying <a href=\"https:\/\/www.neomind.com.br\/en\/blog\/how-to-optimize-asset-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">assets<\/a>, storage locations, whether physical, digital, or portable.<\/p>\n\n\n\n<p>The scope must be comprehensive enough to protect and ensure the security of information while avoiding complex management.<\/p>\n\n\n\n<p>Regarding scope, the standard allows it to be applied to the entire company or a specific department or system.<\/p>\n\n\n\n<p>Pay attention to clauses 4.1 and 4.2 of the standard. The first requires identifying internal and external conditions that can influence the information security system.<\/p>\n\n\n\n<p>The second involves defining relevant stakeholders and their requirements: needs and expectations regarding the organization. These requirements must be evaluated, met, and monitored.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Risk Mapping and Identification<\/h3>\n\n\n\n<p>Now it&#8217;s time to <a href=\"https:\/\/www.neomind.com.br\/en\/blog\/identifying-risks-associated-with-process-changes\/\" target=\"_blank\" rel=\"noreferrer noopener\">evaluate the organization&#8217;s formal risks<\/a>. This process involves data, analyses, and results that must be documented. The identification and evaluation of risks can be scenario-based, like possible events and their consequences, or related to the vulnerability of data storage locations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Establishment of Risk Management<\/h3>\n\n\n\n<p>At this stage, the focus should be on mitigating and controlling risks. Threats must be noted and updated in the security policy.<\/p>\n\n\n\n<p>The company must develop a Statement of Applicability and a Risk Treatment Plan for the auditor to review during the certification audit. These documents should include responses or decisions for each identified risk.<\/p>\n\n\n\n<p>This phase is crucial for establishing responses to identified risks, necessitating new procedures and technologies that ensure security, such as device locks and user authentication. As this will change how activities and procedures are executed in the company, adopt training and awareness programs to reduce resistance and <a href=\"https:\/\/www.neomind.com.br\/en\/blog\/identifying-risks-associated-with-process-changes\/\" target=\"_blank\" rel=\"noreferrer noopener\">non-compliance<\/a> incidents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Monitoring and Audit<\/h3>\n\n\n\n<p>With risks identified and action plans established, verify if policies and controls are effective and compliant with the standard&#8217;s guidelines. Monitoring should be part of daily routine, documenting incidents and procedures performed. This study allows for corrective or preventive actions if results do not meet objectives.<\/p>\n\n\n\n<p>Internal audits are mandatory for monitoring and reviewing procedures. They should be planned periodically to seek changes and improvements. Certification audit is obligatory for any ISO implementation process, covering the documentary evaluation of procedures and system audits, employee interviews, process and infrastructure assessments, among others.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Continuous Improvement<\/h3>\n\n\n\n<p>It&#8217;s important to clarify that ISO 27001 certification is valid and that security must be constantly evaluated. Even after certification, continue monitoring and improving the ISMS. Business growth and evolution bring new opportunities and risks to the business&#8217;s health.<\/p>\n\n\n\n<p>Thus, a <a href=\"https:\/\/www.neomind.com.br\/en\/blog\/continuous-improvement-in-process-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">continuous improvement<\/a> approach is crucial. Implement a process management system to ensure optimized and properly controlled workflow.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>The link Between ISO 27001 and Process Management<\/h2>\n\n\n\n<p>Companies of different sizes and sectors can apply ISO 27001. Every type of business has data that needs protection.<\/p>\n\n\n\n<p>ISO and Process Management are interlinked, as fully implementing standards and guidelines requires a complete understanding of business processes.<\/p>\n\n\n\n<p>A process management platform allows for centralizing information, enabling secure activities, access, and data use.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.neomind.com.br\/en\/fusion-platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">Neomind\u2019s Fusion Platform<\/a> is a comprehensive tool for managing processes, documents, and indicators, helping companies achieve their goals by optimizing processes for efficient, effective, and legally compliant workflows.<\/p>\n\n\n\n<p>Thus, the software enables the identification, analysis, modeling, documentation, monitoring, and improvement of organizational workflows. Aligned with ISO 27001 standards, Fusion Platform ensures each user is properly authenticated, with access control specifications incorporated into processes. Some users are authorized to modify data, while others can only view or are restricted from accessing them.<\/p>\n\n\n\n<p>Additionally, the platform has traceability, meaning every access or edit is recorded, allowing for monitoring when and by whom it occurred.<\/p>\n\n\n\n<p>Neomind&#8217;s solution includes a complete Risk Management module, enabling detailed action plans to mitigate impacts.<\/p>\n\n\n\n<p>Adopting an integrated approach with Fusion Platform and ISO 27001 ensures data and information security while making the organization more efficient.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.neomind.com.br\/en\/try\/?ref=blog&amp;utm_source=blog&amp;utm_medium=organic&amp;utm_campaign=iso-27001\" target=\"_blank\" rel=\"noreferrer noopener\">Try Fusion Platform<\/a> and gain total control and monitoring over your business&#8217;s sensitive data.<\/p>\n\n\n\n<div role=\"main\" id=\"form-ebook-macroprocesses-f0ecdea857d1b01c8c7e\"><\/div><script type=\"text\/javascript\" src=\"https:\/\/d335luupugsy2.cloudfront.net\/js\/rdstation-forms\/stable\/rdstation-forms.min.js\"><\/script><script type=\"text\/javascript\"> new RDStationForms('form-ebook-macroprocesses-f0ecdea857d1b01c8c7e', 'UA-28569974-1').createForm();<\/script>\n","protected":false},"excerpt":{"rendered":"<p>ISO 27001 is a standard comprising guidelines to enhance your organization&#8217;s information security.<\/p>\n","protected":false},"author":4,"featured_media":27732,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[358],"tags":[],"class_list":["post-27723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ISO 27001: Everything You Need to Know<\/title>\n<meta name=\"description\" content=\"ISO 27001 is a standard comprising guidelines to enhance your organization&#039;s information security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001: Everything You Need to Know\" \/>\n<meta property=\"og:description\" content=\"ISO 27001 is a standard comprising guidelines to enhance your organization&#039;s information security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Neomind\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/neomindsocial\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-07T14:57:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T16:13:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/thumb-iso-27001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Farley Niehues\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Farley Niehues\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\"},\"author\":{\"name\":\"Farley Niehues\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/b7a6c35e3796a355e5d500b76658825a\"},\"headline\":\"ISO 27001: Everything You Need to Know\",\"datePublished\":\"2024-08-07T14:57:03+00:00\",\"dateModified\":\"2024-08-07T16:13:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\"},\"wordCount\":1059,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg\",\"articleSection\":[\"Innovation &amp; IT\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\",\"url\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\",\"name\":\"ISO 27001: Everything You Need to Know\",\"isPartOf\":{\"@id\":\"https:\/\/www.neomind.com.br\/#website\"},\"about\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg\",\"datePublished\":\"2024-08-07T14:57:03+00:00\",\"dateModified\":\"2024-08-07T16:13:03+00:00\",\"description\":\"ISO 27001 is a standard comprising guidelines to enhance your organization's information security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage\",\"url\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg\",\"contentUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg\",\"width\":770,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.neomind.com.br\/#website\",\"url\":\"https:\/\/www.neomind.com.br\/\",\"name\":\"Neomind\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.neomind.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.neomind.com.br\/#organization\",\"name\":\"Neomind\",\"url\":\"https:\/\/www.neomind.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png\",\"contentUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png\",\"width\":1280,\"height\":713,\"caption\":\"Neomind\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/neomindsocial\",\"https:\/\/www.instagram.com\/neomind.solutions\/\",\"https:\/\/www.linkedin.com\/company\/neomind\/\",\"https:\/\/www.youtube.com\/NeomindSocial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/b7a6c35e3796a355e5d500b76658825a\",\"name\":\"Farley Niehues\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d017a6bc42c6a6a9a7c62d2cb625df05d80b8f51dd8727d184d00b94d8d5bf23?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d017a6bc42c6a6a9a7c62d2cb625df05d80b8f51dd8727d184d00b94d8d5bf23?s=96&d=mm&r=g\",\"caption\":\"Farley Niehues\"},\"description\":\"Farley Niehues \u00e9 diretor de opera\u00e7\u00f5es na Neomind, bacharel em Administra\u00e7\u00e3o pela Univille, p\u00f3s-graduado em Engenharia de Software pela PUC-PR e membro certificado da AIIM (Association for Information and Image Management). Atua na \u00e1rea de Gest\u00e3o da Informa\u00e7\u00e3o h\u00e1 mais de 18 anos como l\u00edder em projetos cr\u00edticos em gest\u00e3o de documentos, processos e intelig\u00eancia competitiva, com larga experi\u00eancia nos mais variados mercados.\",\"url\":\"https:\/\/www.neomind.com.br\/en\/blog\/author\/farley-niehues\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISO 27001: Everything You Need to Know","description":"ISO 27001 is a standard comprising guidelines to enhance your organization's information security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/","og_locale":"en_US","og_type":"article","og_title":"ISO 27001: Everything You Need to Know","og_description":"ISO 27001 is a standard comprising guidelines to enhance your organization's information security.","og_url":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/","og_site_name":"Neomind","article_publisher":"https:\/\/www.facebook.com\/neomindsocial","article_published_time":"2024-08-07T14:57:03+00:00","article_modified_time":"2024-08-07T16:13:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/thumb-iso-27001.jpg","type":"image\/jpeg"}],"author":"Farley Niehues","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Farley Niehues","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#article","isPartOf":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/"},"author":{"name":"Farley Niehues","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/b7a6c35e3796a355e5d500b76658825a"},"headline":"ISO 27001: Everything You Need to Know","datePublished":"2024-08-07T14:57:03+00:00","dateModified":"2024-08-07T16:13:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/"},"wordCount":1059,"commentCount":0,"publisher":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"image":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg","articleSection":["Innovation &amp; IT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/","url":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/","name":"ISO 27001: Everything You Need to Know","isPartOf":{"@id":"https:\/\/www.neomind.com.br\/#website"},"about":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"primaryImageOfPage":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage"},"image":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg","datePublished":"2024-08-07T14:57:03+00:00","dateModified":"2024-08-07T16:13:03+00:00","description":"ISO 27001 is a standard comprising guidelines to enhance your organization's information security.","breadcrumb":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#primaryimage","url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg","contentUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2024\/08\/capa-iso-27001.jpg","width":770,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.neomind.com.br\/en\/blog\/iso-27001-everything-you-need-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio"}]},{"@type":"WebSite","@id":"https:\/\/www.neomind.com.br\/#website","url":"https:\/\/www.neomind.com.br\/","name":"Neomind","description":"","publisher":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.neomind.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.neomind.com.br\/#organization","name":"Neomind","url":"https:\/\/www.neomind.com.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png","contentUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png","width":1280,"height":713,"caption":"Neomind"},"image":{"@id":"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/neomindsocial","https:\/\/www.instagram.com\/neomind.solutions\/","https:\/\/www.linkedin.com\/company\/neomind\/","https:\/\/www.youtube.com\/NeomindSocial\/"]},{"@type":"Person","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/b7a6c35e3796a355e5d500b76658825a","name":"Farley Niehues","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d017a6bc42c6a6a9a7c62d2cb625df05d80b8f51dd8727d184d00b94d8d5bf23?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d017a6bc42c6a6a9a7c62d2cb625df05d80b8f51dd8727d184d00b94d8d5bf23?s=96&d=mm&r=g","caption":"Farley Niehues"},"description":"Farley Niehues \u00e9 diretor de opera\u00e7\u00f5es na Neomind, bacharel em Administra\u00e7\u00e3o pela Univille, p\u00f3s-graduado em Engenharia de Software pela PUC-PR e membro certificado da AIIM (Association for Information and Image Management). Atua na \u00e1rea de Gest\u00e3o da Informa\u00e7\u00e3o h\u00e1 mais de 18 anos como l\u00edder em projetos cr\u00edticos em gest\u00e3o de documentos, processos e intelig\u00eancia competitiva, com larga experi\u00eancia nos mais variados mercados.","url":"https:\/\/www.neomind.com.br\/en\/blog\/author\/farley-niehues\/"}]}},"_links":{"self":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/27723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/comments?post=27723"}],"version-history":[{"count":3,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/27723\/revisions"}],"predecessor-version":[{"id":27739,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/27723\/revisions\/27739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/media\/27732"}],"wp:attachment":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/media?parent=27723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/categories?post=27723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/tags?post=27723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}