ISO/IEC 27001 Certified Event Management Software

See how certified processes, controlled access, and end-to-end safeguards help you run events with confidence meeting compliance requirements without slowing down execution.

First name *
Last name *
Work email *
Phone *
Organization *
Number of events *

By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. You can reply STOP to opt-out of further messaging.

Thank you!

One of our sales representatives will contact you shortly.

INTRODUCTION

Enterprise security is not a feature list. It is a management system: documented controls, scoped ownership, third-party audits, evidence you can test, and failure modes that are engineered, measured, and rehearsed.

InEvent positions its security program around formal assurance (SOC 2 Type II, GDPR-aligned privacy controls, and ISO 27001 certification statements) and operational transparency (published SLA, RTO/RPO targets, and vulnerability remediation timelines). (InEvent)

This page is written for vendor risk assessments where the “red pen” is looking for: scope, control intent, implementation detail, audit artifacts, and the exact evidence to request. It maps common security-review questions to ISO/IEC 27001:2013 Annex A control families, then ties those to the platform and governance statements InEvent publishes (security, GDPR, and trust pages) and to the standard artifacts enterprise buyers expect: ISO certificate, Statement of Applicability (SoA), SOC 2 report, pen test executive summary, vulnerability management SLAs, and incident response procedures. (InEvent)

The Certification (What it actually means)

“Compliant” vs “Certified” (and why procurement should care)

Compliant is an internal claim: “We follow ISO principles.” It is not, by itself, a third-party attestation.

Certified is externally validated: a registrar audits your Information Security Management System (ISMS) against ISO/IEC 27001 requirements. The output is a certificate with:

  • Scope statement (what business units, products, and locations are included)

  • Validity dates and surveillance cycle

  • Certifying body (registrar)

  • Standard edition (2013 or 2022, as listed on the certificate)

InEvent publicly states ISO 27001 certification in its communications. Treat that as an entry point, then move immediately to evidence: certificate + scope + SoA. (InEvent)




The scope question that kills deals

A real ISO 27001 review starts with: “What is in scope of the ISMS?”

If the ISMS scope is narrow (example: “only corporate IT” or “only one product module”), certification does not automatically cover the SaaS platform you are buying.

If the scope is broad (product engineering, operations, support, HR, and the hosting environment), then certification is materially meaningful.

Evidence to request

  1. ISO 27001 certificate (shows scope and dates)

  2. ISMS scope statement (usually a short document)

  3. Statement of Applicability (SoA) (control selection and justification)

  4. Risk assessment methodology and latest risk treatment plan (redacted is fine)

  5. Internal audit schedule and management review summary (redacted is fine)

InEvent also publishes SOC 2 Type II compliance statements and indicates certificates can be requested through account management channels, reinforcing a “provide evidence on request” posture. (InEvent)



The SoA Deep-Dive (How to read certification like a buyer)

The Statement of Applicability (SoA) is the single most useful ISO 27001 document in procurement because it shows how the vendor translated the standard into real controls. A certificate tells you “audited and certified.” The SoA tells you what controls are in scope, which ones are excluded, and why.

How to read the SoA without wasting time
Start with three questions:

  1. Which Annex A controls are marked “not applicable,” and what is the justification?
    “Not applicable” can be valid, but weak explanations often hide scope gaps.

  2. Which controls are applicable but implemented through third parties (cloud provider, payment gateway, etc.)?
    This is normal in SaaS. You just need the boundary stated clearly.

  3. Which controls rely on process rather than technology?
    Training, access reviews, incident response, and vendor due diligence are often process-heavy. You want proof of execution cadence.

What a strong SoA signals
A strong SoA will show:

  • Clear scope linkage (controls match the actual SaaS service boundary)

  • Practical control descriptions (not generic boilerplate)

  • Mapped evidence types (logs, tickets, reviews, policies)

  • Control ownership (who is accountable internally)

If you only add one requirement to your vendor review checklist, make it this: certificate + scope statement + SoA. That trio prevents most “surprise gaps” later, especially in regulated environments.


How ISO 27001 aligns to what you actually care about

ISO 27001 is not a technical checklist. It is a governance standard that forces a company to operationalize:

  • Risk management (identify, treat, accept, avoid, transfer)

  • Policy control (documented expectations)

  • Control implementation (Annex A)

  • Evidence (audit trails, testing, reviews)

  • Continuous improvement (nonconformities, corrective actions)

For SaaS event technology, the most decisive control families are typically:

  • A.9 Access Control

  • A.10 Cryptography

  • A.12 Operations Security

  • A.14 System acquisition, development, and maintenance

  • A.15 Supplier relationships

  • A.16 Information security incident management

  • A.17 Business continuity

  • A.18 Compliance

InEvent publishes control-relevant statements across its security page (RBAC, logging/auditing, monitoring, password protections, server locations) and trust page (SLA, failover posture, RTO/RPO, remediation timelines). (InEvent)

Access Control (Annex A.9)

Does InEvent support SSO?

Yes. InEvent supports SAML 2.0 and OpenID Connect, including an Azure Active Directory (OIDC) integration path. For governance, enforce mandatory SSO at company or event level and require direct IdP-to-InEvent integration (no intermediary SSO layers). (InEvent FAQ)



Control intent (A.9)

Annex A.9 is about ensuring that:

  • Access is authorized, least-privilege, and reviewed

  • Users are uniquely identifiable

  • Privileged access is tightly controlled

  • Authentication mechanisms are appropriate to risk

  • Access is revoked quickly when no longer needed




Platform implementation themes (what InEvent publicly states)

From InEvent’s security data and privacy statements, key access-control measures include:

  • Role-based access control (RBAC) options for provisioning access (InEvent)

  • Unique account/username/password access control (InEvent)

  • Account lockout and password expiration (InEvent)

  • One-way encryption for all passwords (InEvent)

  • Logging and auditing for read and write operations (InEvent)

  • Failed login attempts and malicious input monitoring (InEvent)

  • Limited IP ranges to user-level access (network-level restriction concept) (InEvent)

  • Employee access limited to a limited amount of accounts (InEvent)

  • Physical token access to authenticate operations (an internal operational safeguard) (InEvent)

These statements map directly to common vendor questionnaire prompts: RBAC, authentication, brute-force controls, privileged access restrictions, and audit logging.



SSO architecture and governance (what to enforce)

InEvent’s SSO guidance states:

  • Supported methods include SAML 2.0, Azure AD (OIDC), and OpenID Connect (InEvent FAQ)

  • SSO can be set at company or event level, and applies across both (InEvent FAQ)

  • InEvent cautions against “intermediary SSO layers” and requires direct IdP integration with InEvent endpoints (InEvent FAQ)

What a government or enterprise buyer should do

  • Require SSO for staff and admins

  • Disable local passwords for privileged roles where possible, or restrict to break-glass accounts

  • Require IdP policies: MFA, device posture, conditional access, geo/IP conditions

  • Use group-to-role mapping for least privilege

  • Implement joiner/mover/leaver processes enforced by the IdP, not by manual app administration




Evidence to request (A.9)

Ask for artifacts that prove enforcement and review:

  • RBAC role matrix (platform roles and what each can access)

  • SSO configuration guide and supported claims

  • Audit-log sample exports showing authentication events and administrative actions (InEvent)

  • Access review process (frequency, approvers, evidence format)

  • Termination and contractor offboarding procedure (IT + HR handoff)

InEvent’s published position that logging and auditing exist for read and write operations is the starting point; you validate with samples. (InEvent)

Cryptography & Encryption (Annex A.10)

Is event data encrypted in transit?

Yes. InEvent states that data is encrypted and transmitted using Secure Socket Layers (SSL) technology. For enterprise assurance, confirm modern TLS configurations, certificate management, and whether encryption is enforced end-to-end across web, APIs, and integrations. (InEvent)



Control intent (A.10)

Annex A.10 ensures cryptography is used correctly:

  • Protect confidentiality and integrity in transit

  • Protect confidentiality at rest where required

  • Control key management (generation, storage, rotation, access)

  • Define crypto policy (approved algorithms, minimum key sizes, deprecation rules)




What InEvent publicly states (and what it implies)

InEvent explicitly states encryption in transit via SSL and one-way encryption for passwords. (InEvent)

Practical reading

  • “SSL” is typically used colloquially to mean SSL/TLS for HTTPS transport encryption.

  • “One-way encryption for passwords” indicates password hashes rather than reversible encryption.




What to verify during procurement (do not skip)

Even if a vendor states transport encryption, a serious assessment confirms:

  • TLS versions supported and minimum enforced

  • HSTS, secure cookie flags, session timeouts

  • API endpoints enforce HTTPS and reject downgrade

  • Certificate rotation and key custody controls

  • Whether administrative interfaces are segregated or protected via additional controls

Evidence to request

  • Encryption policy excerpt (transport, secrets, password storage)

  • Key management overview (where keys live, who can access, rotation approach)

  • Pen test executive summary that includes transport and authentication findings (see Section 4) (InEvent)

Where InEvent does not publish a specific algorithm statement on its public pages, you treat algorithm-level and key-management detail as NDA material in the vendor trust pack, not as assumptions.

Operations Security (Annex A.12)

Control intent (A.12)

Operations security is where SaaS vendors either become predictable or become risky. Annex A.12 focuses on:

  • Change management

  • Malware protection and monitoring

  • Logging and monitoring

  • Vulnerability management and patching

  • Backup and recovery

  • Capacity and availability management




What InEvent publishes that maps to A.12

Logging and monitoring

  • Logging and auditing for read/write operations (InEvent)

  • Failed login attempts and malicious input monitoring (InEvent)

Vulnerability management remediation timelines
InEvent publishes remediation targets by severity:

  • Critical: 1 hour

  • High: 24 hours

  • Medium: 5 working days

  • Low: 30 working days (InEvent)

Penetration testing cadence
InEvent states it provides “the latest copy of our quarterly pentest” through project management channels. (InEvent)

Availability and failover posture. InEvent states:

  • 99.9% guaranteed uptime SLA (InEvent)

  • A failover mechanism triggered when the main server is not responding, with a serverless approach to data backups/accessibility across instances (InEvent)

  • RTO 4 hours and RPO 24 hours (InEvent)

These are unusually concrete for a public trust page and map directly to business continuity and operations security controls.




How to interpret these statements like an auditor

Remediation timelines

  • The severity-based remediation SLAs are strong only if they are backed by:

    • vulnerability intake process (scanner + triage)

    • patch/change process

    • exception handling with risk acceptance

Quarterly pen tests

  • “Quarterly” is meaningful if the scope is defined:

    • production application and APIs

    • authentication paths (including SSO)

    • OWASP Top 10 testing and business logic testing

    • follow-up validation of remediations

RTO/RPO

  • RTO 4 hours and RPO 24 hours indicate a disaster recovery posture where data loss tolerance is up to 24 hours in worst-case scenarios, and service restoration target is within 4 hours. (InEvent)

  • Your procurement requirement determines whether that is acceptable. Some agencies require tighter RPO for mission systems.




Evidence to request (A.12)

Request operational evidence that matches the published commitments:

  • Latest pen test executive summary and remediation status (under NDA) (InEvent)

  • Vulnerability management policy and sample tickets showing SLAs being met (InEvent)

  • Change management policy and deployment controls

  • Logging/auditing sample exports for administrative actions and data exports (InEvent)

  • DR test schedule and last DR exercise summary (tabletop or live)



Secure SDLC & Change Control (Annex A.14)

Annex A.14 is where ISO 27001 becomes real for SaaS buyers, because it covers how security is engineered into the product lifecycle, not bolted on after launch. Most event platforms fail reviews here for one reason: they cannot clearly show how code moves from “developer laptop” to “production” with predictable controls.

In procurement terms, you are looking for evidence that the vendor’s engineering system reduces the two risks that matter most in event software: unauthorized change and unsafe change.

What A.14 is trying to enforce
A.14 is about building and maintaining secure systems through:

  • Secure design and requirements (security considered before features ship)

  • Secure development practices (review, testing, scanning)

  • Controlled environments (dev/test/prod separation)

  • Controlled releases (approvals, rollbacks, versioning)

  • Protection of sensitive data in non-production environments

What to validate during an assessment
Even when a vendor does not publish full SDLC details publicly, your review should request a standard “secure SDLC evidence pack” under NDA and validate:

  • Code review policy: required peer review for production changes, with evidence of review in the ticketing or PR system

  • Secrets handling: no credentials stored in source control, use of managed secrets, and rotation process

  • Dependency and vulnerability scanning: how third-party libraries are scanned and how fixes are prioritized (tie back to the remediation SLAs already published)

  • Release governance: who approves deployments, how emergency fixes are handled, and how rollbacks work

  • Environment separation: production access restricted, with auditability for administrative actions

  • Change logging: a clear record of what changed, when, and by whom, aligned to the platform’s logging and auditing posture

Why this matters specifically for events
Events compress risk into short windows. A last-minute agenda change, registration rule update, or integration tweak can create real security impact if deployment is chaotic. A controlled SDLC and release process reduces the “silent failure” mode: a change that breaks login, exposes data through misconfiguration, or disrupts uptime during a live program.

Evidence to request (A.14)
Ask for:

  • Secure SDLC policy (or security engineering standards)

  • Change management policy + sample change tickets

  • CI/CD overview (high level) and release approval controls

  • AppSec scanning summary (what tools/classes of tests exist)

  • Exception process (how risk is accepted when timelines are tight)

Supplier Relationships (Annex A.15)

Control intent (A.15)

Annex A.15 is about the reality that SaaS risk is supply-chain risk:

  • hosting provider controls

  • email/SMS providers

  • payment providers

  • analytics and tracking tools

  • support tooling

The control requirement is not “we use AWS.” It is:

  • vendor due diligence

  • contractual controls

  • ongoing monitoring and review

  • clarity on sub-processor roles




What InEvent publishes

Hosting

  • InEvent states it is hosted on Amazon Web Services (AWS). (InEvent)

Data location

  • InEvent states servers are located in Virginia (USA) and Dublin (Ireland). (InEvent)

  • It also states customers can opt into the Ireland-located server for EU privacy alignment. (InEvent)

Sub-processor contracting for GDPR

  • InEvent states it follows Data Processing Agreements (DPA) and Standard Contractual Clauses (SCC) with sub-processors, and that its DPA is reviewed yearly. (InEvent)

Payments

  • InEvent states PCI DSS alignment through integrations with gateway providers such as Stripe and PayPal, and that it only uses PCI DSS-compliant gateway providers. (InEvent)




How to audit supplier relationships in a vendor assessment

For government and regulated enterprises, you want:

  • Sub-processor list with purpose and data categories

  • Evidence of vendor security reviews (SOC reports, ISO certs, SIG/CAIQ)

  • Data flow diagrams for attendee PII

  • Contractual controls:

    • breach notification terms

    • data deletion/return

    • access controls

    • subcontractor change notification

Evidence to request

  • Current sub-processor list and DPA template (InEvent)

  • SCCs (where cross-border transfers exist) (InEvent)

  • Payment flow architecture (whether card data is handled directly or tokenized via gateway) (InEvent)

AWS shared responsibility statement aligned to the InEvent service boundary (InEvent)

Incident Management (Annex A.16)

Control intent (A.16)

A.16 requires defined and tested incident handling:

  • detection and reporting

  • triage and classification

  • containment, eradication, recovery

  • evidence preservation and forensic readiness

  • stakeholder notification

  • lessons learned and corrective action




What InEvent publishes that maps to incident expectations

On its GDPR compliance page, InEvent cites the GDPR breach notification requirement “where feasible, within 72 hours,” and states it monitors API usage and provides triggers that can be activated for IT security teams. (InEvent)

This is not a full incident response plan, but it supports:

  • awareness of regulatory timelines

  • an operational monitoring concept tied to customer usage patterns




What a “no-call-needed” incident assurance package includes

If you want a CISO to approve without a call, provide:

  • Incident Response Policy (IRP)

  • Severity classification matrix

  • On-call coverage model (SIRT)

  • Evidence retention and log integrity controls

  • Customer notification workflow and templated communications

  • Post-incident review process and corrective action tracking

Evidence to request

  • IRP excerpt and notification SLAs

  • Last tabletop exercise summary (redacted)

  • Sample incident postmortem structure (template)

Logging/auditing capability evidence (InEvent)

Business Continuity (Annex A.17)

What is InEvent’s uptime SLA and recovery targets?

Yes. InEvent publishes a 99.9% uptime SLA, with stated recovery objectives of RTO 4 hours and RPO 24 hours. It also describes an automatic failover mechanism and a backup/accessibility approach across instances for continuity. (InEvent)



Control intent (A.17)

A.17 ensures information security continuity is built into business continuity:

  • continuity planning and testing

  • redundancy and recovery capability

  • recovery objectives (RTO/RPO)

  • communication plans and customer obligations



What InEvent publishes

BCP summary commitments. InEvent publishes a Business Continuity Plan summary, stating it will:

  • safeguard employees and property

  • assess financial/operational impact

  • quickly recover and resume operations

  • protect books and records

  • allow clients to use systems

  • if unable to continue business, assure prompt client access to data and logs (InEvent)

Annual review
InEvent states it updates the plan at least annually and when material changes occur. (InEvent)

Operational targets
From the trust page:

  • 99.9% guaranteed uptime SLA (InEvent)

  • RTO 4 hours, RPO 24 hours (InEvent)

  • failover mechanism and backup/accessibility approach across instances (InEvent)



How to use these targets in procurement language

If you are writing contract requirements or a security addendum, align:

  • SLA and service credits (if applicable)

  • RTO/RPO commitments for the service tier you are buying

  • DR test frequency and evidence delivery

  • Customer obligations (example: IdP uptime for SSO, DNS control for custom domains)

Evidence to request

  • DR architecture summary and last DR test results (redacted)

  • BCP full plan under NDA (beyond the public summary) (InEvent)

  • Incident communications and escalation tree aligned to your agency requirements

Annex: ISO 27001:2013 Annex A mapping checklist (practical)

Use this as a procurement control map. It is designed to generate a complete evidence request in one pass.

A.5 Information security policies

  • Request: Information security policy, acceptable use, data classification policy

  • Look for: executive approval, review cadence, training acknowledgement

A.6 Organization of information security

  • Request: security governance chart, roles and responsibilities, risk committee outputs

  • Look for: formal ownership and segregation of duties

A.7 Human resource security

  • Request: background check policy (where applicable), onboarding/offboarding SOP, security training cadence

A.8 Asset management

  • Request: asset inventory approach for production systems, data inventory for PII

A.9 Access control

  • Request: RBAC model, privileged access controls, SSO guide, audit-log samples (InEvent FAQ)

A.10 Cryptography

  • Request: encryption policy, password storage method, key management overview (InEvent)

A.11 Physical and environmental security

  • Request: data center assurance package (inherited from cloud provider), and internal office controls if relevant (InEvent)

A.12 Operations security

  • Request: vulnerability management policy, remediation SLA evidence, change management, monitoring/logging controls, pen test outputs (InEvent)

A.13 Communications security

  • Request: network segmentation overview, secure admin access methods, IP restriction approach (InEvent)

A.14 System acquisition, development, and maintenance

  • Request: secure SDLC policy, code review requirements, OWASP alignment, release controls (InEvent)

A.15 Supplier relationships

  • Request: sub-processor list, DPA/SCCs, vendor review procedure, payment provider scope (InEvent)

A.16 Incident management

  • Request: IR plan, notification SLAs, tabletop results, evidence preservation and logging (InEvent)

A.17 Business continuity

  • Request: DR architecture, DR test evidence, BCP full plan, SLA/RTO/RPO commitments (InEvent)

A.18 Compliance

Request: ISO certificate + SoA, SOC 2 Type II report, privacy policy alignment, data retention and deletion controls (InEvent)

The shortest path to "approved without a call"

If you want a reviewer to close the assessment fast, bundle these in a trust pack (with NDA where needed):

  1. ISO 27001 certificate + scope + SoA (confirm standard edition and registrar) (InEvent)

  2. SOC 2 Type II report (latest period) (InEvent)

  3. Quarterly pen test executive summary + remediation status (InEvent)

  4. Vulnerability management SLAs and evidence of adherence (InEvent)

  5. Trust metrics: SLA, RTO/RPO, failover description (InEvent)

  6. DPA + SCCs + sub-processor list (and data residency options) (InEvent)

Audit log samples aligned to: admin actions, exports, authentication events (InEvent)

FAQ for Security Reviews

Q1: Do you hold SOC 2 Type II as well?

Yes. InEvent states it is SOC 2 Type 2 certified/compliant and indicates a copy of the certificate can be requested through account management channels. (InEvent)


Q2: Where are the servers located, and what does that mean for data residency?

Yes. InEvent states its servers are located in Virginia (USA) and Dublin (Ireland), and customers can opt into the Ireland server location for EU privacy alignment. (InEvent)


Q3: Do you encrypt data in transit?

Yes. InEvent states that data is encrypted and transmitted using SSL technology. Validate TLS configuration, certificate lifecycle, and enforcement across APIs during the security review. (InEvent)


Q4: Do you provide audit logs that show who did what?

Yes. InEvent states that logging and auditing are available for read and write operations and that it monitors failed login attempts and malicious input. Validate by requesting sample exports aligned to your use cases (exports, admin actions, SSO logins). (InEvent)


Q5: What is your uptime SLA and recovery posture?

Yes. InEvent publishes a 99.9% uptime SLA, describes a failover mechanism, and provides RTO 4 hours and RPO 24 hours targets. Confirm whether your service tier and contract incorporate these targets and what evidence is available for DR testing. (InEvent)


Q6: Can we review penetration test results?

Yes. InEvent states that a copy of its quarterly pen test can be provided through project management channels. Request an executive summary plus remediation status, under NDA, and ensure scope includes the production web app and APIs. (InEvent)


Q7: What vulnerability remediation SLAs do you commit to?

Yes. InEvent publishes remediation targets by severity: Critical 1 hour, High 24 hours, Medium 5 working days, Low 30 working days. Validate with evidence from ticketing and change management and ask how severity is assigned and governed. (InEvent)


Q8: Are you GDPR-aligned for breach notification expectations?

Yes. InEvent’s GDPR material references the GDPR expectation of notifying supervisory authorities “where feasible, within 72 hours” and describes monitoring/triggers tied to API usage. Your contract should still define customer notification timelines and content. (InEvent)

Recent materials

  • All categories
  • E-books
  • Articles
  • Videos
  • Webinars

The complete platform for all your events

Pedro Goes

goes@inevent.com

+1 470 751 3193

InEvent InEvent InEvent InEvent

We use cookies to improve your website experience and provide more personalized services to you across our platform.

To find out more about the cookies we use, see our Privacy Policy.