

The ISO Show
Blackmores UK
Blackmores is a pioneering consultancy firm with a distinctive approach to working with our clients to achieve and sustain high standards in Quality, Risk and Environmental Management. We'll be posting podcasts discussing ISO standards here very soon!
Episodes
Mentioned books

Sep 21, 2022 • 32min
#116 10 Top Tips to get you through your Surveillance Audit
The work doesn’t stop once you get ISO certified, there is a requirement to complete an annual surveillance audit to ensure your Management System continues to meet the requirements of the standard(s). Last week Mel covered some basic preparation you can do ahead of a Surveillance Audit, but what should you expect on the actual audit day? Today, Mel shares 10 top tips to help you prepare and ensure your next surveillance audit runs as smoothly as possible. You’ll learn What is a Surveillance Audit? What to expect during the Surveillance Audit Considerations for remote vs on-site audits What evidence do you need to have prepared? Resources isology Hub Blackmores ISO Support In this episode, we talk about: [00:36] A description of a Surveillance Audit [02:00] A summary of the 10 top tips [02:40] There is no right or wrong way to prepare for a Surveillance Audit – but the following tips will be applicable regardless of the standard your certified to [03:30] Tip 1: Be Prepared – A summary of what Mel covered in the previous episode [05:40] Tip 2 – The opening Meeting – Be sure to have all people involved in the audit present at the meeting. It’s advised to have a member of the leadership team present. Here the Auditor will explain the different types of audit findings. [08:00] Tip 3 – Audit questions – Similar to your Stage 1 and 2 Assessment, you will be asked a lot of questions. Try to be specific with your answers, and don’t be afraid to ask for clarification. Don’t worry if you don’t know the answers to certain questions outside of your area of expertise, simply direct them to the correct individual who can answer. You are within your rights to seek clarification on findings – Do not argue with the auditor, simply ask for justification on findings if you’re confused as to why they’re being raised. [13:05] Tip 4: Keep on track – It’s everyone’s best interest to stick to the Agenda. [13:35] Tip 5: On-site Surveillance audits – Do a floor walk before the auditor arrives to check that you’re following your procedures. Make sure reception knows that the Auditor is arriving, and follows any of your standard visitor procedures. Try to book a room to base the audit in to avoid them overhearing any unnecessary chatter and to allow the auditor and auditees some privacy. [16:05] Tip 6: Remote Surveillance Audits – Ensure that you follow any company remote working procedures. Ensure you have a good wi-fi connection, all attendees should be visible on camera but be muted when not speaking. Make sure everyone has access to the necessary documents while off-site. [17:15] Tip 7: The Auditor – They are human, and they are here to support you to ensure you are doing what you say you’re doing. They are experts on their Standards and it’s advised to foster a friendly relationship with them. But please be aware that they shouldn’t be sending you reports from personal email addresses, be left unattended on-site and shouldn’t be talking any information off-site – show evidence on screen / in-person during the audit. [20:20] Tip 8: The closing Meeting – Held at the end of the day. Listen to the feedback and findings from the auditor – they are there to help you improve. Feel free to ask for further clarification if needed. It’s advised to have everyone at the opening meeting present at the closing meeting. [22:38] Tip 9: Evidence needed – You will typically need, audit schedule, audit reports and Management Review Minutes. You may also need various policies and procedures. Ensure that all documents are version controlled and any applicable branding is consistent. [24:10] Tip 10: Enjoy it! – If you’re doing everything you say you’re doing, then you should enjoy showing off your Management System. The resulting report should be seen as an opportunity to continually improve – the auditor only wants the best for your business. We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Sep 14, 2022 • 27min
#115 How to prepare for a Surveillance Audit
The work doesn’t stop once you get ISO certified, there is a requirement to complete an annual surveillance audit to ensure your Management System continues to meet the requirements of the standard(s). Surveillance audits must be carried out by a Certification Body, during which they will typically look at your Management Review, your preventative and corrective actions process, Internal auditing process and the implementation of any recommendations that have come out of an Internal audit. Today, Mel explains how you can prepare for a Surveillance audit and gives examples of some key considerations ahead of the Auditor arriving on site. You’ll learn What is a Surveillance Audit? Why there is a requirement for an annual surveillance audit What you need to prepare ahead of a surveillance audit Resources isology Hub Blackmores ISO Support What to expect during your first ISO Assessment In this episode, we talk about: [00:59] A description of a Surveillance Audit [01:30] The purpose of a Surveillance Audit – Ensuring your Management System meets ISO Standard requirements and as an opportunity to demonstrate continual improvement [02:40] There is no right or wrong way to prepare for a Surveillance Audit – but the following tips will be applicable regardless of the standard your certified to [03:30] Tip 1: Check that you have an Agenda for the visit – This should be provided at the end of your last report from the Certification Body [04:25] A brief overview of how the certification cycle works – A 3 year plan is usually provided to you by your Certification Body [05:50] Ensure that you go ahead with a UKAS accredited Certification Body [06:18] Tip 2: Confirm locations – make sure you know where the auditor is being sent and to prepare staff on site about the impending visit. This can also allow you to book out time for specific people that may be required during the audit [07:10] Tip 3: Ensure you book out time for any required key members of staff – it is also advised that you book out a meeting room for the day [08:45] Be prepared for the Auditor to walk around your site – Especially if they’re assessing ISO 45001 (Health and Safety) and ISO 27001 (Information Security) [09:40] Double check if the auditor visit is on-site or remote [10:30] Tip 4 – Check that you have all the relevant Management System records in place – and that they’re up-to-date [10:50] Examples of what documentation the Auditor will typically look at [13:00] Tip 5 – Make sure you’ve closed out any opportunities for improvement and non-conformities from your last internal audit [14:30] Tip 6 – Check if there have been any changes to your business that may effect the scope of certification i.e. New products or services with no controls in place yet or a new site [16:00] Tip 6: Confirm the auditor’s visit and check if they have any accessibility or dietary needs. [16:30] Tip 7: Warn any relevant reception / security staff about the visit so they know to expect the auditor. Ensure they go through any of your typical security procedures i.e. getting an access card, signing visitor book ect [17:42] Tip 8: Send an email to all staff to remind them about the surveillance visit – good to do this a day or two ahead of the visit [19:45] Tip 9: Do a floor walk – Ensure that any of the physical controls you have in place are working as intended We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Aug 23, 2022 • 38min
#114 What is physical security monitoring
ISO 27002 was recently updated this year – along with a reduction of overall controls, 11 completely news ones were added to keep up with new and emerging technology. One of the new controls added under the Physical category, is something called physical security monitoring. But what does this mean exactly? Steve Mason joins us again today to delve deeper into physical security monitoring to explain what it is and give examples of different types of security and monitoring you can put in place. You’ll learn What physical security monitoring is The purpose of physical security monitoring What should be monitored? Different types of security and monitoring you can consider Resources isology Hub Blackmores ICO CCTV Guidance In this episode, we talk about: [00:36] A quick recap of our ISO 27002 series and it’s purpose to date – Start from Episode 109 [01:58] ISO 27002 controls reduced from 114 controls to 93 – reduction due to some of them being combined or made redundant in the latest version [04:02] The purpose of Physical Security Monitoring [06:22] Example of where security monitoring solved an issue at a bank [07:29] Another example of a London business who lacked physical security monitoring [08:45] The importance of reviewing your need for physical security monitoring – what level do you need? Will it include CCTV, Access cards ect [10:10] An overview of the various access points to consider, including: Main building, secure offices, server rooms, visitor access rights, CCTV, security alarms and personnel [10:53] Example of where failure to verify a visitor highlighted a companies lack of security. [11:30] The importance of communication and inductions for key reception and security staff, to ensure they can do the proper checks on visitors / know who should and should not be allowed into certain areas of your workplace. [13:50] Suggestion of a checklist for checks on visitors for temp reception staff [14:32] How do you define what needs 24 hour monitoring and what can be monitored for selected hours? [15:46] The installation of security measures should be appropriate for your needs – don’t go overboard if it’s not needed. i.e. a Data Centre would need a high level of security but a small office may only need access control [17:48] Take note of any security requirements in customer contracts [18:10] How do you ensure the integrity of your security measures? i.e. CCTV – guidelines are available for installation, including placement, connection to your systems, keeping the timestamps accurate, logging any camera failures. [20:00] Example of where a German company mapped out their CCTV so they could highlight blind spots, which were then pointed out to guards who did more checks in those areas [21:15] Make sure you maintain any security equipment [22:10] What crossover is there with other ISO 27002 controls? i.e. data masking being used in visitor books [24:45] How can you apply this control to home workers? This can include training on being aware of potential security risks at home and locking the computer when not nearby ect We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Aug 17, 2022 • 19min
#113 What is web filtering?
ISO 27002 was recently updated this year – along with a reduction of overall controls, 11 completely news ones were added to keep up with new and emerging technology. One of the new controls added under the technological category, is something called web filtering. But what does this mean exactly? Steve Mason joins us again today to delve deeper into web filtering to explain what it is, breaks down the different types and gives examples of uses that you could implement to reduce risk. You’ll learn What is web filtering? The purpose of web filtering The different types of web filtering Different measures of web filtering that can be implemented Resources isology Hub Blackmores In this episode, we talk about: [01:05] How you can adopt the new controls of ISO 27002 ahead of the latest version of ISO 27001:2022 being published [02:00] The purpose of web filtering [02:26] An overview of what web filtering is: It’s a security technology that monitors web activity and prevents users from accessing websites with malicious content or sites that are deemed to be inappropriate for business use [03:45] Outlook already has web filtering built in [04:17] The Internet is still the dominant facilitator for cyber crime [04:40] Types of web filtering, including: Browser based filters, search engine filters, client side filters and network based filters [06:58] Examples of where web filtering comes into practice – to protect against threats from malicious sites with malware or fishing content, false anti-virus updates, sites with illegal content and sites with out of date SLL certificates. [08:15] Are you safe relying on Microsoft Windows? [08:50] What to look out for on websites to ensure it’s secure: A padlock in the bottom right corner, use of reputable third party payment gateways. [09:27] Examples of what to be wary of when using the web i.e. deals that are too good to be true [11:40] Consider setting up a small internet café that is separate from the company network – to allow employees access for personal use and to help keep your systems safe. We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Aug 9, 2022 • 23min
#112 What is threat Intelligence?
ISO 27002 was recently updated this year – along with a reduction of overall controls, 11 completely news ones were added to keep up with new and emerging technology. One of the new controls added under the organisational category, is something called threat intelligence. But what does this mean exactly? Steve Mason joins us again today to delve deeper into threat intelligence to explain what it is, gives examples of the different types and shares some tools and activities that will help you implement threat intelligence You’ll learn What is threat intelligence? What does threat intelligence actually do? The different types of threat intelligence What tools can you implement to help with threat intelligence? What activities can you do to help implement threat intelligence? Resources isology Hub Blackmores In this episode, we talk about: [01:19] The definition and purpose of threat intelligence [03:01] Threat intelligence doesn’t have to factor into your scope and context – you can integrate findings in later [03:50] Threat intelligence is about being aware of not only internal threats, but global threats that could impact your business [04:50] Threat intelligence is not only about IT (i.e. viruses) [05:19] That being said – cyber threats are still a big factor. So ensure you have tools, training and measures in place to reduce cyber attacks and breaches. [06:30] Types of Threat intelligence, including: Cyber, Strategic and Tactical [07:58] What threat intelligence actually does – Firstly ensure that you are collecting relevant data. That data can be analysed and used to reduce risk, to help you be proactive instead of reactive to threats. [09:51] Threat intelligence is very appliable to Business Continuity (ISO 22301) [10:35] The different types of tools you could consider, including: Security information and event management (SIEM) and CSOC – Cyber Security Operation Centres [12:30] Types of threat intelligence activities you can do. This includes: Establishing objectives, collection of information from selected sources, analysing information to understand how it relates and is meaningful to the business and communicating information to relevant individuals. [15:10] Ensure your threat intelligence is dynamic – and use it to inform and update your Risk Assessments at regular intervals [16:30] Threat intelligence works with the Plan-Do-Act-Check cycle that is commonly seen in most ISO’s [17:10] Threat intelligence can be used by any business regardless of any ISO certification you may or may not have. [18:05] Keep an eye out for our ISO 27001:2022 migration support offering! Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan! We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Aug 3, 2022 • 33min
#111 What is data masking?
ISO 27002 was recently updated this year – along with a reduction of overall controls, 11 completely news ones were added to keep up with new and emerging technology. One of the new controls added under the technological category, is something called Data Masking. But what does this mean exactly? Steve Mason joins us again today to delve deeper into data masking to explain what it is, why it’s so important and details a few of the different types of data masking You’ll learn What is data masking? Why is data masking important? How does data masking work? What are the different types of data masking? Resources ISOlogy Hub Blackmores In this episode, we talk about: [01:33] The purpose of data masking according to ISO 27002 – Now more clearly defined when compared to earlier versions [02:55] A brief overview of PII (Personally Identifiable Information) [03:52] A summary of the defined attributes of data masking [05:25] What is data masking? Including definitions for obfuscation, data anonymization and pseudonymisation [08:50] The benefits of having a more clearly defined control for protecting PII [09:35] Other standards where data masking is applicable - ISO 27017, ISO 27018 and ISO 27701 [11:27] Why data masking is so important currently [12:40] How data masking works in practice [13:10] Static data masking - data is masked in an original database then duplicated into a test environment [13:34] Dynamic data masking - The original sensitive data remains in the repository. Data is never exposed to unauthorised users, contents are shuffled in real-time on-demand to make the contents masked [14:50] On the fly data masking - Masking data while it is transferred from production systems to test or development systems before the data is saved to disk. [15:55] Techniques for data masking include – Substitution - Businesses substitute the original data with random data from supplied or customised lookup file. [16:15] Shuffling - Businesses substitute original data with another authentic-looking data but they shuffle the entities in the same column randomly. [17:09] Number and date variances - For financial and date-driven data sets, applying the same variance to create a new dataset doesn’t change the accuracy of the dataset while masking data. [17:56] Encryption is still the number one method for data masking [18:40] Character scrambling - This method involves randomly rearranging the order of characters. This process is irreversible so that the original data cannot be obtained from the scrambled data. [19:50] Other forms of data to take into consideration - Protected health information, Payment card information, Intellectual property and Company specific Information [23:02] How GDPR promotes data masking Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan! We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Jul 27, 2022 • 37min
#110 What are the 11 new controls in ISO 27002?
ISO 27002 was recently updated this year – along with a reduction of overall controls, 11 completely news ones were added to keep up with new and emerging technology. As a reminder, ISO 27002 (Information security, cybersecurity and privacy protection — Information security controls) is a guidance document which provides further best practice advice to strengthen your IT Security. Today, Steve Mason explains the changes made to the 2022 version of ISO 27002, gives a summary of the 11 new controls and gives some examples of some key considerations and actions you can take to implement them. You’ll learn What changes have been made to ISO 27002:2022 Why ISO 27002 has been updated in 2022 An overview of the 11 new controls added to ISO 27002 Examples of actions you can take to implement the new controls Resources ISOlogy Hub Blackmores In this episode, we talk about: [01:28] A brief summary of the changes to ISO 27002:2022, including new controls, new structure and attribute types [05:30] Controls in ISO 27002 now have a defined purpose to avoid misinterpretation [06:29] A summary of the 11 new controls by name and category [08:10] Threat intelligence – What tools do you have in place to identify threats? How do you monitor your threat intelligence effectiveness? [11:20] Information Security use of Cloud Services – A reminder that ISO 27017 covers this in more detail! Do you have a cloud policy in place? Does it align with your clients security requirements? [13:10] ICT readiness for Business Continuity – Focus on recovery of IT services following a disaster. Do you have Business Impact Assessments in place? If you’re certified to ISO 22301 – this area is most likely covered [14:36] Physical Security monitoring – Are you monitoring physical security? i.e. keycard access, CCTV ect [16:23] Configuration Management – Are you IT systems working well together? Do you have an established configuration for passwords? (i.e. how many characters, alpha numerical, symbols ect) [18:13] Information Deletion – If data needs to be deleted, that it’s deleted in a secure manor and can’t be recovered. [21:48] Data Masking – Make sure that any data that shouldn’t be shared is masked in some way i.e. obfuscated or anonymized. [23:31] Data Leakage – Put measures in place to stop data being leaked through i.e. USB’s, people sending business information to personal email addresses ect [26:55] Monitoring Activities – You could monitor network traffic, software access ect. Be selective in your monitoring, only do so if it will be of benefit to the business. [28:04] Web Filtering – Ensure that employees can’t access any nefarious / high risk websites that could cause a security breach [30:15] Secure Coding – Make sure that coding is done securely – making sure that any software developed is secure and free of as many vulnerabilities as possible. Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan! We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Jul 13, 2022 • 15min
#109 What's new with ISO 27002:2022?
Did you know there were 80 identified security incidents, resulting in 34,908,053 compromised records in June 2022 alone! Standards such as ISO 27001 can help you put measures in place to reduce risk and help set up procedures for data recovery. However, not as many adopt the guidance document ISO 27002 which provides further best practice advice to strengthen your IT Security. ISO 27002 has recently been updated with 11 new controls that tackle recent emerging technology not covered in ISO 27001:2013. Today, Mel explains ISO 27002 (Information security, cybersecurity and privacy protection - Information security controls), why it’s been updated and gives a high-level overview of the changes. You’ll learn The purpose of ISO 27002 How ISO 27002 works with ISO 27001 Why ISO 27002 has been updated in 2022 A basic overview of the changes to controls within ISO 27002:2022 Resources ISOlogy Hub Blackmores In this episode, we talk about: [00:30] A reminder to keep an eye out for future episodes on the upcoming updated version of ISO 27001:2022 [00:52] An introduction to the guidance document ISO 27002 [02:02] Controls from the updated version of ISO 27002 can be implemented right now – not a requirement of ISO 27001 but recommended. [02:25] Why ISO 27002 has been updated – To bring it up-to-date with the latest technologies and simplification of controls [03:15] What this means for your Information Security Management System [03:50] We expect to see the new controls in ISO 27002 to be reflected in the updated version of ISO 27001 coming out later this year. [4:27] Reminder: ISO 27002 is not a certifiable standard but it is best practice. [05:00] ISO 27002 had its last major update in 2013 – think how much technology has changed since then! [06:00] A summary of the changes to controls in ISO 27002 [07:25] New controls added to ISO 27002 highlight that the standard is more then just IT Security – A trait shared with ISO 27001 [09:13] A summary of what categories the 11 new controls fall under Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan! We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Jul 7, 2022 • 18min
#108 How to align your Management System with the Sustainable Development Goals
The Sustainable Development Goals have been established by world leaders with the hope that we can work together towards a better world by 2030. The last two episodes provide an overview of all 17 Goals and related ISO Standards that you could align with to meet these goals. But how do you put this into practice? How do you go about aligning your Management System to the SDG’s? Today, Mel explains the role ISO Implementation plays in working towards a better future and shares 5 actions you can take to align your businesses Management System. You’ll learn How ISO Implementation can help you align with the SDG’s Why it’s important to show support for the SDG’s 5 Practical actions you can take to align your Management System with the SDG’s Resources United Nations Sustainable Development Goals ISOlogy Hub Blackmores Carbonology In this episode, we talk about: [00:46] A reminder to watch the 2 previous episodes to learn about each of the 17 SDG’s [00:52] The importance of ISO’s and how they can help work towards a better future, including alignment with the SDG’s [01:24] Find out what SDG’s align with certain ISO’s on the ISO.org website [02:19] Recommended action: Look at what your currently certified to and what other ISO Standards of interest that you could adopt to enhance your Management System [04:40] If you need assistance with aligning to the SDG’s or want to implement an ISO – Blackmores can help, and we have resources available on the isologyhub [05:30] Action 1: Leadership Commitment – Have you made a declaration of commitment to the SDG’s? Where have you displayed this commitment? [07:10] Action 2: Management Review – Include discussions around your SDG commitment within a Management review. Make sure any actions are noted in the meeting minutes. [08:31] Action 3: Context of the Organization – Consider actions related to SDG’s in SWOT and PESTLE’s [10:10] Action 4: Objectives – Set out clear key performance indicators to achieve your commitment to select SDG’s. Can be short or long term. [11:20] Action 5: Operational Controls – Put controls in place that actively work towards achieving objectives related to the SDG’s Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan! We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List

Jun 22, 2022 • 27min
#107 What are the Sustainable Development Goals? Part 2
In 2015, world leaders came together to create 17 Sustainable Development Goals (SDG’s) which aim to tackle various social, economic and environmental issues, to build a better world by 2030. What you may not be aware of is the fact that ISO Standards play a big part in the journey towards a better future. Many commonly used ISO Standards already meet certain goals, with more in development. This is part 2 of our 2-part series on the United Nations Sustainable Development Goals and the ISO standards that support them. Today, Mel explains the 7 remaining SDGs, the ISO standards that relate to them and how organisations can meet these goals… You’ll learn The ISO standards that relate to the sustainable development goals. How to align your business with the SDG’s. The ISO standards that can help you meet the last 7 SDGs. Details of the final 7 SDGs and the ISO standards that relate to them. How we define what best practice is. How ISO standards are developed. Resources United Nations Sustainable Development Goals ISOlogy Hub Blackmores In this episode, we talk about: [00:46] The Sustainable Development Goals set out by the UN. [02:27] How ISO 9001 and 14001 relate to the SDGs. [02:56] Goal 10 (Reduced inequalities) and how ISO 26000 (Guidance for social responsibility) relates to it. [06:04] Goal 11 (Sustainable cities and communities) and the series of standards ISO 37101, ISO 37120, ISO 37122, ISO 37123, and ISO 22301 that can help meet this goal. [07:50] Goal 12 (Responsible consumption and production) and the related standards ISO 14020 Series, ISO 15392, and ISO 20245. [10:42] Goal 13 (Climate Action) and the standards that help with climate change and greenhouse gases ISO 14001, ISO 14064, ISO 14067, and PAS 2060. [14:14] Goal 14 (Life underwater) and the 250 sustainability-related Standards dedicated to Shipping, port waste management and protection of marine life. [15:30] Goal 15 (Life on land) and the related standards ISO 14001 and ISO 38200. [16:27] Goal 16 (Peace, justice and strong institutions) and the standards that support this goal ISO 37001, ISO 37301, and ISO 37000. [18:18] Goal 17 (Partnerships for the goals) and it’s relevance to ISO Standards. [19:43] How ISO standards are developed. Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan! We’d love to hear your views and comments about the ISO Show, here’s how: Share the ISO Show on Twitter or Linkedin Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List