What is the role of the CEO in obtaining ISO 27001 certification?

Mobility Work
14/6/2021
2
min

ISO 27001 certification is a major step for companies like Mobility Work that want to offer an irreproachable service to their customers in terms of data security and confidentiality. In a few videos, we show you the process that allowed us toobtain ISO 27001 certification by Bureau Veritas.

Today, discover the role played by our CEO Morgane Guinot throughout this journey.

The CEO, a leading role in the ISO 27001 certification process

For Morgane Guinot, management must be very involved in this process, in order to train teams with them to implement best practices leading to certification. This is why she took her lead role to heart to initiate and implement the 27001 certification project within Mobility Work.

Through this project, Morgane Guinot wanted above all to meet the requests and requirements of our customers in terms of security And of confidentiality of their data, in particular of those, many, who are considering a wider deployment of Mobility Work CMMS solution within their company. Thanks to this certification, our customers have a guarantee of the seriousness of our teams in implementing and complying with good security practices.

The growing importance of ISO 27001 certification

Although ISO 27001 certification is not yet imposed by the State, this standard is more and more often integrated into new standards. Indeed, companies, especially larger ones, are increasingly vigilant about the security of personal and professional data. They therefore have increasing demands on their business partners, for example to protect themselves from ransomware attacks, which are increasingly targeting other links in the supply chain.

The particularity of the ISO 27001 standard is Addressing safety through risks. A certified company is a company that has demonstrated that it takes into account the risks that weigh on its sensitive data and that it protects itself from them, both by defending its IT systems against intrusions and disasters, but also by applying best practices for 360° security: this is what we call the ISMS, or Information Security Management System.

Any questions?

Contact us to discover the first CMMS that can be deployed in 3 weeks.

Request a demo