Skip to Main Content
This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:
Online exclusive! Receive a free eBook when you purchase a training course or toolkit - for a limited time only!
Gambling Commission Security Audit - Gap Analysis

Gambling Commission Security Audit - Gap Analysis

SKU: 4583
Format: Consultancy

Pass your annual Gambling Commission security with an expert gap analysis from IT Governance’s information security and ISO 27001 experts.

For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service
Description

Gambling Commission Security Audit - Gap Analysis

The Gambling Commission requires all remote gambling operator licensees to complete an annual third-party security audit against particular sections of ISO 27001, and to submit a report to the Commission as evidence of compliance.


Do you have the necessary controls and policies in place to pass your annual security audit?

With over 15 years’ experience implementing best-practice information security management systems, we are ideally positioned to help remote gambling operators comply with the applicable ISO 27001 clauses, as set out under section 4 of the Remote gambling and software standards (RTS).

What's included

What does the Gambling Commission Security Requirements Consultancy service include?

IT Governance will perform a gap analysis against the selected ISO 27001 controls and provide you with a detailed project plan enabling you to address the gaps. We will also guide you through the process of complying with the security requirements using a mentor and coach approach –all in a time-efficient and cost-effective manner.

As part of our service we will cover the following selected ISO 27001 controls as mandated by the Gambling Commission:

A.5 Information security policies

A.6 Organisation of information security

A.7 Human resources security

A.8 Asset management

A.9 Access control

A.10 Cryptography

A.11 Physical and environmental security

A.12 Operations security

A.13 Communications security

A.14 System acquisition, development and maintenance

A.15 Supplier relationships

A.18 Compliance

Customer Reviews

(0.00)stars out of 5
# of Ratings: 0
Loading...