Today, the term cybersecurity is regularly used, but its exact meaning, its difference from information security, and its relationship with an Information Security Management System (ISMS) are still misunderstood by many. As global regulations and standards continue to progress, understanding these concepts has never been more important.
According to ISO/IEC 27032:2023, Cybersecurity — Guidelines for Internet Security, cybersecurity provides guidance for “Internet-related services and related ICT systems and networks as an extension of network security.”
Previous editions of the standard defined cybersecurity as the preservation of confidentiality, integrity, and availability (CIA) of information within the cyberspace, the interconnected environment created by people, software, and services operating over the Internet.
Those familiar with information security will recognize the CIA triad, confidentiality, integrity, and availability, as the main protection objectives. Cybersecurity builds upon these values but focuses mainly on the digital and online dimensions of risk, the cyberspace environment.
In organizational terms:
While the PDCA and the risk-based method of ISO/IEC 27001 remains applicable, cybersecurity introduces new and exclusive dimensions that extend beyond the organization’s traditional IT border. Key areas include:
Commitment in cyberspace increases the number of interested parties, including customers, cloud providers, regulators, and business partners. Clearly defining communication channels, shared responsibilities, and information exchange procedures become crucial for secure collaboration.
The Internet operates as a public infrastructure. Cloud services, network providers, and third-party vendors may collectively influence security outcomes. Since ISO/IEC 27001 requires every asset to have an identifiable owner, organizations must adapt their asset management and risk assessment frameworks to align with these shared environments.
The spread of IoT devices, often resource-limited, remotely deployed, and challenging to update, introduces important patch management and ownership complexities. Organizations must strengthen incident response, third-party risk management, and monitoring strategies to mitigate these evolving threats.
Modern cyber threats include DDoS attacks, phishing, social engineering, supply-chain compromises, zero-day exploits, and more. Organizations must enhance security awareness, threat detection, and incident handling capabilities to counter these evolving risks effectively.
Cyber incidents often impact multiple stakeholders and can quickly become public. Attempting to cover breaches can damage trust and reputation. Additionally, many authorities order timely incident reporting to regulators. Organizations must, therefore, ensure that communication plans, incident response procedures, and business continuity strategies are aligned with legal and reputational requirements.
For organizations with an existing ISMS, achieving cybersecurity readiness does not require starting anew, it requires adapting. Conduct a gap analysis, apply the PDCA methodology, and integrate essential changes into existing frameworks. Most foundational elements, such as policies, risk assessments, monitoring, and incident management, already exist and can be extended to the cyberspace context.
Using ISO/IEC 27032 as complementary guidance can strengthen your ISMS by:
PECB supports individuals in strengthening their cybersecurity posture through internationally recognized certification, training, and guidance.
Whether you are beginning your journey in cybersecurity or seeking to integrate ISO/IEC 27032 with your existing ISMS, PECB offers:
By partnering with PECB, you gain the knowledge, credibility, and confidence to effectively manage cybersecurity risks and improve trust in your organization’s digital operations.
About the Author
Vesa Hyseni is a Senior Content and Campaigns Specialist at PECB. She is responsible for creating up-to-date content, conducting market research, and providing insights about ISO standards. For any questions, feel free to reach out to her at support@pecb.com.
Share