{"id":14901,"date":"2020-06-16T14:50:03","date_gmt":"2020-06-16T12:50:03","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=14901"},"modified":"2022-01-17T13:35:16","modified_gmt":"2022-01-17T12:35:16","slug":"information-protection-that-involves-information-security-management","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-dpo\/proteccon-de-la-informacion-que-implica-la-gestion-de-la-seguridad-de-la-informacion\/","title":{"rendered":"Information Protection What does Information Security Management entail?"},"content":{"rendered":"<h3><strong>Why is information important? How do we protect the Information? <\/strong><\/h3>\n<p>Nowadays, the businesses and development of the activities of most organizations and agencies depend and have always depended on the <em>Information. <\/em>The <strong><em>information<\/em><\/strong> has been <strong><em>the most important asset<\/em><\/strong> and valuable of an organization so far and therefore it is necessary to be able to maintain its <strong>security.<\/strong><\/p>\n<p>In order to maintain the security of the <strong><em>information, <\/em><\/strong>We must first study the <strong>fact<\/strong> who is the one who composes the information through its treatment.<\/p>\n<p>If we want to maintain and manage data security we must implement a <strong><em>Information Security Management System<\/em><\/strong>. There are different regulations that explain and guide how to implement a <strong><em>Information Security Management System<\/em><\/strong> and appropriate security measures to keep data secure, an example is ISO 27000 standards and the NIST SP800 Series Guides. There is also a legal and legal framework that requires us to keep information secure, complying with basic requirements and principles.<\/p>\n<p>This legal framework is currently reflected among other laws in the <em>General Data Protection Regulation, <a href=\"https:\/\/www.boe.es\/eli\/es\/lo\/2018\/12\/05\/3\" target=\"_blank\" rel=\"noopener\">the Organic Law on Data Protection and Digital Rights Guarantees<\/a>, the Information Security Services Law, National Security Scheme, Critical Infrastructure Protection Law, etc\u2026 <\/em>An Information Security System also helps us comply with this legal framework.<\/p>\n<h3><strong>What does Information Security Management entail?<\/strong><\/h3>\n<p>In order to understand an Information Security Management System, we must understand that:<\/p>\n<p><em>\u201cA system is a set of rules or principles about a subject rationally linked to each other.\u201d<\/em><\/p>\n<p>Therefore we must understand that a<em> Information Security Management System is a set of rules or principles related to each other, which aim to manage information security.<\/em><\/p>\n<p>Rules and principles comprise a set of policies, regulations, organizational structures, resources, procedures and processes that facilitate and manage the information of an organization.<\/p>\n<p><strong>How does studying a Master in Data Protection benefit?\u00a0<\/strong><\/p>\n<p>Implementing an Information Security Management System is not easy, studying a Master in Data Protection will give you the necessary knowledge to understand the steps to follow to implement, maintain and optimize an Information security management system from scratch .<\/p>\n<p><b>Do you want to specialize in Compliance Management and data protection? <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-data-protection-management-and-chief-compliance-officer\/\">click here and find out<\/a>.\u00a0<\/b><\/p>","protected":false},"excerpt":{"rendered":"<p>The protection of information is the most valuable thing in an organization, which is why it is necessary to maintain its security.<\/p>","protected":false},"author":33,"featured_media":14918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[330],"tags":[],"class_list":["post-14901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-dpo"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/14901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=14901"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/14901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/14918"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=14901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=14901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=14901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}