TY - STAND AU - Vitalii Susukailo AU - Ivan Opirsky AU - Oleh Yaremko AB - The chapter addresses the Information Security Management System (ISMS) establishment approach, ensuring necessary controls to avoid widespread cybersecurity threats nowadays. The most common attack vectors and techniques of the last three years were analyzed in this chapter to define a set of information security practices, which can minimize risks related to modern cybersecurity threats. BT - Springer International Publishing DA - 2021-12-10 DO - 10.1007/978-3-030-92435-5_15 N1 - Conducted analysis of cybersecurity frameworks such as ISO 27001/2, CIS Top 18, NIST 800-53, and their differentiators. An ISMS establishment algorithm is proposed in this chapter with a detailed explanation of each phase and controls required for system implementation. The document defines cybersecurity technologies for management systems are determined based on the infrastructure type. The documentation management framework and risk management methodology are proposed and analyzed modern awareness strategies and defined education roadmap for ISMS roles. N2 - The chapter addresses the Information Security Management System (ISMS) establishment approach, ensuring necessary controls to avoid widespread cybersecurity threats nowadays. The most common attack vectors and techniques of the last three years were analyzed in this chapter to define a set of information security practices, which can minimize risks related to modern cybersecurity threats. PY - 2021 T2 - Springer International Publishing TI - Methodology of ISMS Establishment Against Modern Cybersecurity Threats UR - https://link.springer.com/chapter/10.1007/978-3-030-92435-5_15 SN - 1876-1100 ER -