We begin with a scoping call to set the boundaries for your ISMS. Our experts then work with you to design the framework, select the relevant Annex A controls, and define your core ISMS processes.
We co-create approximately 15 core information security policies tailored to your business. Concurrently, we conduct a formal risk assessment, including risk identification, evaluation, and treatment planning.
We guide your team in gathering the necessary operational proof required by auditors. This includes collecting logs, system configurations, employee training records, and other critical evidence.
To ensure there are no surprises, we run a readiness check that simulates a real audit to identify any final gaps. We then help you address the findings before the formal audit process begins.
We compile all documentation, policies, risk assessments, and evidence into a comprehensive pack, ready for a smooth and successful handover to your Stage 1 auditors.