Skip to content
  • (408) 883-8053
  • [email protected]
Facebook-f
Twitter
Linkedin
  • Blog
  • Careers
  • Demo
  • Login
Menu
  • Blog
  • Careers
  • Demo
  • Login
resilic-logo
  • Products
  • Pricing
  • Resources
    • Learning Center
    • Events
  • Company
    • About
    • News
  • Contact
Menu
  • Products
  • Pricing
  • Resources
    • Learning Center
    • Events
  • Company
    • About
    • News
  • Contact
resilic-logo
  • Products
  • Pricing
  • Resources
    • Learning Center
    • Events
  • Company
    • About
    • News
  • Contact
  • Blog
  • Careers
  • Demo
  • Login
Menu
  • Products
  • Pricing
  • Resources
    • Learning Center
    • Events
  • Company
    • About
    • News
  • Contact
  • Blog
  • Careers
  • Demo
  • Login
Facebook-f
Twitter
Linkedin
  • Blog
  • Careers
  • Demo
  • Login
Menu
  • Blog
  • Careers
  • Demo
  • Login
resilic-logo
  • Products
  • Pricing
  • Resources
    • Learning Center
    • Events
  • Company
    • About
    • News
  • Contact
Menu
  • Products
  • Pricing
  • Resources
    • Learning Center
    • Events
  • Company
    • About
    • News
  • Contact

ISO/IEC 27001:2013

ISO 27001:2013 certification pertains to the Information Security of Resilinc’s in-house data, customer and supplier data collection, storage, IT management, IT infrastructure management and sharing processes. Specifically, the company operates an Information Security Management System which complies with the requirements for ISO 27001:2013 for the following scope: The information security management system is applicable to development and Operation of Supply Chain Risk Management Solutions, Physical Security, Admin, Facilities, Human Resources and Information Technology.

It is essential for Resilinc customers and suppliers that participate in the company’s global supply chain risk management network that they have complete confidence in the processes by which their sensitive financial and operational data is used and shared.

About ISO 27001:2013 certification

ISO 27001:2013 is the most widely recognized Information Security Management System and standard. It can be used in industries of any size, anywhere in the world. Registration to ISO 27001 (or other ISO 27000 standards) provides objective proof that a business has implemented an effective Information Security management system, and that it satisfies all of the requirements of the applicable standard. An external, impartial expert called a registrar or CB (Certification Body) conducts an on-site audit to determine whether or not a company is in conformance to the standard. For any query related to certification please drop an email to [email protected].

Criteria to Achieve ISO 27001:2013  ISMS  Certification

  • The organization has clear ideas about their objectives
  • The organization must be prepared to incorporate an Information Security management system into every area of business
  • All staff must be aware of what is expected of them and where their areas of responsibility lie, in order to achieve ISO 27001 Certification
  • A documented Information Security management system is required, together with the policies and procedures required by ISO 27001
  • The organization should be aware of their Information Security requirements and that those need to be recorded, met, and continually exceeded to ensure Information Security
  • The organization must establish a system for management of Information Security which includes and is not limited to human resources, infrastructure, and work environment
  • The organization must adopt effective method to measure, analyze, and improve their Information Security processes
  • Top level management of the organization must demonstrate their ownership towards implementation of ISMS by establishing an Information Security policy, Information Security and organizational objectives, as well as monitoring, measurement, and continual improvement of Information Security.

Key Benefit Categories of ISO 27001:2013 ISMS  Implementation

  • Process approach
  • Framework for ensuring Information Security and continual improvement of Information Security measures
  • Planned assessment for Information Security Assessment review
  • Process control
  • Measurement, analysis, and improvement
  • Delivery planning and execution
  • Training processes and assessment
  • Document control

Benefits of ISMS Implementation to Resilinc & External Stakeholders

Resilinc
  • Provides senior management with an efficient Information Security management process
  • Sets out areas of responsibility across the organization
  • Communicates a positive message and confidence about Information Security to staff and customers/suppliers
  • Identifies and encourages more efficient Information Security processes
  • Highlights deficiencies in Information Security
  • Provides continuous assessment and improvement in Information Security
  • Affords enhanced marketing opportunities
Customers
    • Ensure Information Security of all Data, and Supplier information shared with Resilinc
    • Negligible or Zero Information Security leakage complaints
    • Independent audit demonstrates commitment to Information Security

    ISO Objectives for Which Resilinc has complied with for this certification

    • Information Security
    • Leadership
    • Involvement of people
    • Process and systematic approach
    • Timely audits every year
    • Ensuring gaining Confidence in Customer and Supplier relationships

    Resilinc Process Changes Implemented to Achieve ISO 27001 Certification

Process Documentation
  • Ensured development and deployment of ISMS policy and relevant processes
  • Ensured that all standard processes have SOPs
  • Ensured that process flow diagrams are available for each of the standard processes
  • Established that standard forms and templates are available on a shared repository
Training and Assessment
  • Developed standard ISMS training plans and ensured that assessment records are available and maintained for each team
  • All new joinee’s also undergo this training when they join
  • Implemented effectiveness monitoring based on assessment results and made remediation testing available when needed
Document Control
  • Implemented processes to ensure that all changes to SOPs (amendments/updates) are communicated to all team members
  • Established a mandatory requirement that all changes to standard documents are subject to ‘Document Change Request’ for both control purposes and to ensure that the most current/updated version is being used
Continuous Improvement
  • All policies and processes will be reviewed on periodic basis to ensure relevance and offer possibilities of improvement in Information Security.

Let Resilinc Help You Today

Reduce Your Supply Chain Management Risks

Email Now|Call Now|Chat Now

Receive Our Weekly Newsletter

Subscribe
resilinclogo

Most Trusted, Cognitive Supply Chain Risk Management Platform

Products

Blog

Career

  • Eventwatch
  • Riskshield
  • Cognitive Mapping
  • Supplier Capability Assessment
  • R Score
  • Business Continuity
  • CyberSCRM
Menu
  • Eventwatch
  • Riskshield
  • Cognitive Mapping
  • Supplier Capability Assessment
  • R Score
  • Business Continuity
  • CyberSCRM

Company

  • About
  • News
  • Events
Menu
  • About
  • News
  • Events

Resources

  • White Papers & Reports
  • Case Studies
  • On-Demand Webinars
Menu
  • White Papers & Reports
  • Case Studies
  • On-Demand Webinars

Follows Us

Facebook-f
Twitter
Linkedin
Sales: [email protected] Support: [email protected] Call us: (408) 883-8053
resilinclogo

Most Trusted, Cognitive Supply Chain Risk Management Platform

Company

  • About
  • News
  • Events
Menu
  • About
  • News
  • Events

Resources

  • White Papers & Reports
  • Case Studies
  • On-Demand Webinars
Menu
  • White Papers & Reports
  • Case Studies
  • On-Demand Webinars
  • Products
  • Blog
  • Careers
Menu
  • Products
  • Blog
  • Careers

Follows Us

Facebook-f
Twitter
Linkedin
Sales: [email protected]
Support: [email protected] Call us: (408) 883-8053

© 2021 Resilinc Corporation. All rights reserved.

Data Security

Privacy Policy

Thank You

Suspendisse ipsum eros, tincidunt sed commodo ut, viverra vitae ipsum. Etiam non porta neque. Pellentesque nulla elit, aliquam in ullamcorper at, bibendum sed eros. Morbi non sapien tellus, ac vestibulum eros. In hac habitasse platea dictumst. Nulla vestibulum, diam vel porttitor placerat,

Download Your Copy of The 2017 Annual Report Today

Register