{"id":148393,"date":"2023-09-20T19:11:58","date_gmt":"2023-09-20T22:11:58","guid":{"rendered":"https:\/\/sandbox2.institutopmg.com\/itsm\/applying-information-security-management-in-iso-20000\/"},"modified":"2025-12-11T14:00:09","modified_gmt":"2025-12-11T17:00:09","slug":"applying-information-security-management-in-iso-20000","status":"publish","type":"post","link":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/","title":{"rendered":"Applying Information Security Management in ISO 20000"},"content":{"rendered":"<p>Hey there IT aficionados! In today\u2019s ever-evolving digital landscape, fortifying your organization against potential threats is not just optional but essential. Enter the realm of Information Security Management as delineated in the <a href=\"https:\/\/itsmhouse.com\/information-security-management-in-iso-20000\/\">ISO<\/a> 20000:2018. Let\u2019s delve into the nuts and bolts of this management system and see what it encompasses.<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Navegue por t\u00f3picos de interesse:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#1_Information_Security_Policy_Your_Safety_Manual\" >1. Information Security Policy: Your Safety Manual<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#2_Crafting_a_Sturdy_Information_Security_Management_System\" >2. Crafting a Sturdy Information Security Management System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#3_Strategy_Aligning_Safety_with_Business_Goals\" >3. Strategy: Aligning Safety with Business Goals<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#4_Organizational_Structure_Defining_Roles_and_Responsibilities\" >4. Organizational Structure: Defining Roles and Responsibilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#5_Security_Controls_Your_Safety_Net\" >5. Security Controls: Your Safety Net<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#6_Risk_Management_Playing_it_Safe\" >6. Risk Management: Playing it Safe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#7_Monitoring_Processes_The_Watchful_Guardian\" >7. Monitoring Processes: The Watchful Guardian<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#8_Communication_Strategy_Keeping_Everyone_in_the_Loop\" >8. Communication Strategy: Keeping Everyone in the Loop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#9_Training_and_Awareness_Cultivating_a_Conscious_Team\" >9. Training and Awareness: Cultivating a Conscious Team<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"1_Information_Security_Policy_Your_Safety_Manual\"><\/span><strong>1. Information Security Policy: Your Safety Manual<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>At the heart of Information Security Management is a well-detailed policy that serves as the roadmap for safeguarding your company&#8217;s sensitive data. This policy is not just a document but a pledge to uphold the highest standards of security in every IT endeavor.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"2_Crafting_a_Sturdy_Information_Security_Management_System\"><\/span><strong>2. Crafting a Sturdy Information Security Management System<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Next in line is formulating a system that encapsulates all the norms, procedures, and guidelines to support the policy mentioned above. It\u2019s the framework that ensures the policy is not just words on paper but a living, breathing entity, guiding your IT processes daily.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"3_Strategy_Aligning_Safety_with_Business_Goals\"><\/span><strong>3. Strategy: Aligning Safety with Business Goals<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A robust security strategy is the cornerstone that links your security endeavors with business strategies, plans, and objectives. It acts as the anchor, ensuring that while chasing business goals, the security of your information does not take a backseat.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"4_Organizational_Structure_Defining_Roles_and_Responsibilities\"><\/span><strong>4. Organizational Structure: Defining Roles and Responsibilities<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Here, we are talking about creating an organizational framework where everyone knows their role in maintaining security. It\u2019s not just an IT department&#8217;s job; it\u2019s a collaborative effort that hinges on well-defined roles and responsibilities.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"5_Security_Controls_Your_Safety_Net\"><\/span><strong>5. Security Controls: Your Safety Net<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Imagine having a safety net that catches any security breaches. That\u2019s what security controls are &#8211; a set of measures in place to ensure that the security policies are not just a theory but practiced daily.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"6_Risk_Management_Playing_it_Safe\"><\/span><strong>6. Risk Management: Playing it Safe<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In the realm of IT, risk is a constant companion. Hence, having a system that continually assesses and manages security risks is not just prudent but necessary to steer clear of potential pitfalls.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"7_Monitoring_Processes_The_Watchful_Guardian\"><\/span><strong>7. Monitoring Processes: The Watchful Guardian<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Monitoring processes act as the watchful guardians, ensuring adherence to the laid-down norms and providing feedback through timely reports. They are the eyes and ears keeping a vigilant watch over your IT landscape.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"8_Communication_Strategy_Keeping_Everyone_in_the_Loop\"><\/span><strong>8. Communication Strategy: Keeping Everyone in the Loop<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Having a strategic communication pathway ensures that the relevant stakeholders are always in the know, fostering a culture of transparency and readiness.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"9_Training_and_Awareness_Cultivating_a_Conscious_Team\"><\/span><strong>9. Training and Awareness: Cultivating a Conscious Team<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Lastly, a comprehensive training and awareness plan is indispensable. It aims to foster a team that is not only skilled but also security-conscious, acting as the first line of defense against security threats.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Implementing Information Security Management as outlined in <a href=\"http:\/\/iso.org\">ISO<\/a> 20000 is not just about ticking boxes. It\u2019s about creating a fortress of security where every layer works in harmony, ensuring a safe and secure IT environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey there IT aficionados! In today\u2019s ever-evolving digital landscape, fortifying your organization against potential threats is not just optional but essential. Enter the realm of Information Security Management as delineated in the ISO 20000:2018. Let\u2019s delve into the nuts and bolts of this management system and see what it encompasses. 1. Information Security Policy: Your [&hellip;]<\/p>\n","protected":false},"author":85233,"featured_media":148394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9435,9433],"tags":[9648,9618,10332,9493,10459,10460],"class_list":["post-148393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iso-20000","category-tutorials","tag-information-security-management","tag-iso-20000-2","tag-it-security","tag-risk-management","tag-security-policies","tag-security-training"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Applying Information Security Management in ISO 20000 - PMG Academy<\/title>\n<meta name=\"description\" content=\"Discover the comprehensive approach to Information Security Management as detailed in ISO 20000:2018. From policies to training, learn how to build a secure IT fortress.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Applying Information Security Management in ISO 20000\" \/>\n<meta property=\"og:description\" content=\"Discover the comprehensive approach to Information Security Management as detailed in ISO 20000:2018. From policies to training, learn how to build a secure IT fortress.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\" \/>\n<meta property=\"og:site_name\" content=\"PMG Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/adriano.martinsantonio\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-20T22:11:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T17:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adriano Martins Antonio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adriano Martins Antonio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\"},\"author\":{\"name\":\"Adriano Martins Antonio\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\"},\"headline\":\"Applying Information Security Management in ISO 20000\",\"datePublished\":\"2023-09-20T22:11:58+00:00\",\"dateModified\":\"2025-12-11T17:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg\",\"keywords\":[\"Information Security Management\",\"iso 20000\",\"IT Security\",\"risk management\",\"Security Policies\",\"Security Training\"],\"articleSection\":[\"ISO 20000\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\",\"name\":\"Applying Information Security Management in ISO 20000 - PMG Academy\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg\",\"datePublished\":\"2023-09-20T22:11:58+00:00\",\"dateModified\":\"2025-12-11T17:00:09+00:00\",\"description\":\"Discover the comprehensive approach to Information Security Management as detailed in ISO 20000:2018. From policies to training, learn how to build a secure IT fortress.\",\"breadcrumb\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tutorials\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISO 20000\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/iso-20000\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Applying Information Security Management in ISO 20000\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"name\":\"PMG Academy\",\"description\":\"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis\",\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\",\"name\":\"PMG Academy\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"width\":6964,\"height\":2938,\"caption\":\"PMG Academy\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\",\"name\":\"Adriano Martins Antonio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"url\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"contentUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"caption\":\"Adriano Martins Antonio\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adriano.martinsantonio\"],\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/author\/adrianopmgacademy-coms\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Applying Information Security Management in ISO 20000 - PMG Academy","description":"Discover the comprehensive approach to Information Security Management as detailed in ISO 20000:2018. From policies to training, learn how to build a secure IT fortress.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/","og_locale":"en_US","og_type":"article","og_title":"Applying Information Security Management in ISO 20000","og_description":"Discover the comprehensive approach to Information Security Management as detailed in ISO 20000:2018. From policies to training, learn how to build a secure IT fortress.","og_url":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/","og_site_name":"PMG Academy","article_publisher":"https:\/\/www.facebook.com\/PMG.Academy.Brasil","article_author":"https:\/\/www.facebook.com\/adriano.martinsantonio","article_published_time":"2023-09-20T22:11:58+00:00","article_modified_time":"2025-12-11T17:00:09+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg","type":"image\/jpeg"}],"author":"Adriano Martins Antonio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adriano Martins Antonio","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#article","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/"},"author":{"name":"Adriano Martins Antonio","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7"},"headline":"Applying Information Security Management in ISO 20000","datePublished":"2023-09-20T22:11:58+00:00","dateModified":"2025-12-11T17:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage"},"thumbnailUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg","keywords":["Information Security Management","iso 20000","IT Security","risk management","Security Policies","Security Training"],"articleSection":["ISO 20000","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/","url":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/","name":"Applying Information Security Management in ISO 20000 - PMG Academy","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage"},"thumbnailUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg","datePublished":"2023-09-20T22:11:58+00:00","dateModified":"2025-12-11T17:00:09+00:00","description":"Discover the comprehensive approach to Information Security Management as detailed in ISO 20000:2018. From policies to training, learn how to build a secure IT fortress.","breadcrumb":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#primaryimage","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled-1.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/sandbox2.institutopmg.com\/en\/applying-information-security-management-in-iso-20000\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tutorials","item":"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/"},{"@type":"ListItem","position":2,"name":"ISO 20000","item":"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/iso-20000\/"},{"@type":"ListItem","position":3,"name":"Applying Information Security Management in ISO 20000"}]},{"@type":"WebSite","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website","url":"https:\/\/sandbox2.institutopmg.com\/en\/","name":"PMG Academy","description":"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis","publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization","name":"PMG Academy","url":"https:\/\/sandbox2.institutopmg.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","width":6964,"height":2938,"caption":"PMG Academy"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PMG.Academy.Brasil"]},{"@type":"Person","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7","name":"Adriano Martins Antonio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","contentUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","caption":"Adriano Martins Antonio"},"sameAs":["https:\/\/www.facebook.com\/adriano.martinsantonio"],"url":"https:\/\/sandbox2.institutopmg.com\/en\/author\/adrianopmgacademy-coms\/"}]}},"_links":{"self":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/148393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/users\/85233"}],"replies":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/comments?post=148393"}],"version-history":[{"count":2,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/148393\/revisions"}],"predecessor-version":[{"id":149238,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/148393\/revisions\/149238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media\/148394"}],"wp:attachment":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media?parent=148393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/categories?post=148393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/tags?post=148393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}