Available Standards (12)
Showing standards 1 - 12
Chairman advisory group
Preparation of a first draft business plan - Review the task list ( N08) provided by the CEN-CLC Cybersecurity Coordination Group (CSCG) and asses how these tasks could be taken..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Cybersecurity services
Cybersecurity services..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Data Protection, Privacy and Identity Management
Data Protection, Privacy and Identity Management..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Decentralised Identity Management Model based on Blockchain and other Distributed Ledgers Technologies — Part 1: Generic Reference Framework
The proposed standard will specify a reference architecture for decentralised identity management, optionally enabled by distributed ledger technology (DLT) and blockchain syste..
DISCUSSION GROUPS
Circular Economy including Digital Product Passport
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
The standard provides guidelines for the security standards of organizational information and information security management practices, including the selection, implementation..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)
The standard provides a guideline on the mechanisms to ensure that the methods and processes used in the investigation of information security incidents are "fit for purpos..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)
The standard defines the specific guidelines for the management of digital data which are the identification, collection, acquisition and preservation of digital evidence that c..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015)
This standard provides a guide for the analysis and interpretation of digital data in a way that highlights problems related to continuity, validity, reproducibility and repeata..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015)
Describes guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence...
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016)
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices...
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Management systems and controls sets
The WG considers national and international standards for adoption in the domain of management system standards including supporting control sets covering information and cyber..
DISCUSSION GROUPS
Cybersecurity/Network and Information security
Security evaluation and assessment
Security evaluation and assessment..
DISCUSSION GROUPS
Cybersecurity/Network and Information security