Author - Alan Calder

Alan Calder is an acknowledged international cyber security guru and a leading author on information security and IT governance issues.

Alan has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ).

Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.

Recommended textbook for the UK Open University’s postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses
In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:

Discuss the ISO 27001/27002:2022 updates
Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002
Highlight why data protection and information security … Read More

Winner of “Best Cyber Book of the Year” at The Real Cyber Awards 2023!
The book will give you a good understanding of the fundamentals of cybersecurity and resilience, without tying them to specific standards, frameworks, or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Read More

ISO 27001 is one of the leading information security standards. It offers an internationally recognized route for organizations of all sizes and industries to adopt and demonstrate effective, independently verified information security.
This book will help you understand:

How ISO 27001 and ISO 27002 can benefit your organization
The requirements of ISO 27001:2022 and ISO 27002:2022
The ISO certification process
Key terms and definitions used within these standards

Read More

This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
Read More