<aside> đź’ˇ

Information on this trust center is generally about ISMS Copilot v1, the ancestor of current ISMS Copilot built, on another technology. If you’re using the latest ISMS Copilot 2.0, access the dedicated trust page, where we detailed how we’re taking security even further. In case you have any specific question or doubt, you can always reach out.

➡️ Find everything you need to know about ISMS Copilot 2.0

</aside>

ISMS Copilot

At ISMS Copilot, we maintain a robust organizational security structure to ensure the protection of our systems, data, and users. Our approach includes:

Security

Security is management by a Certified Information Security Manager, responsible for implementing and maintaining our security controls.

Employee Background Checks

All employees and contractors undergo thorough background checks before joining our team.

Security Awareness Training

We conduct regular security awareness training for all employees, covering topics such as phishing prevention, data handling, and incident reporting.

Access Control

We implement the principle of least privilege, ensuring employees only have access to the resources necessary for their roles.

Security Policies and Procedures

We maintain comprehensive security policies and procedures, which are regularly reviewed and updated.

Third-Party Risk Management

We have a rigorous vendor assessment process to ensure our partners and subprocessors meet our security standards.

Incident Response Plan

We have alerts to detect incidents, and have a plan ready to quickly address any security incidents.

Continuous Improvement

We continuously evaluate and improve our organizational security measures based on emerging threats and industry best practices.

ISMS Policy Generator