PhoenixPro Procurement. technology. contracts. projects.

Slides:



Advertisements
Similar presentations
ISMS implementation and certification process overview
Advertisements

Innovation or Necessity? ISM 158 By: Sepehr Saeb.
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
Developing a Risk-Based Information Security Program
Internal environmental audit - Conf.dr.ing. Oana Brinzan – UAV Arad.
Government Information Assurance (GIA) Policy. 2 Current Scenario  It is a connected world!  More and More services are being provided online  Continuous.
Protection of Information Assets I. Joko Dewanto 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Information Security Policies and Standards
First Practice - Information Security Management System Implementation and ISO Certification.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
SOX & ISO Protect your data and be ready to be audited!!!
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Vs Risk avoidance William Gillette.
Fraud Prevention and Risk Management
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
SecureAware Building an Information Security Management System.
SEC835 Database and Web application security Information Security Architecture.
(ISC)2 SecureLondon 2009, London, United Kingdom This information is not intended, and should not be construed, as an offer to sell, or as a solicitation.
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Bruce Hallas Director Marmalade Box Ltd. UK Business Comparison of Information Security Incidents & Financial Impact Corporate UK SME UK 25% ↓ in number.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Systems and Software Consortium | 2214 Rock Hill Road, Herndon, VA Phone: (703) | FAX: (703) Best.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
ENISA efforts for securing European Internet Infrastructure
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
IT Controls Global Technology Auditing Guide 1.
Solutions Within Reach
Scott Charney Cybercrime and Risk Management PwC.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Case 6.2 Waste Management Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent.
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Primary Steps for Achieving ISO Certification.
Defining your requirements for a successful security (and compliance
IS YOUR ORGANISATION’S INFORMATION SECURE?
Learn Your Information Security Management System
Management System Jai Maaruthi Consultaant Chennai & Singapore
سيستم مديريت امنيت اطلاعات
Office 365 Security Assessment Workshop
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
ROB PROW MIPI/MCMI ALTERNATIVE SOLUTIONS LIMITED
Maritime Business Solutions
Must cost less than possible Impact
Cyber Risk & Cyber Insurance - Overview
HIPAA Security A Quantitative and Qualitative Risk Assessment
Discussion points for Interpretation Document on Cybersecurity
Awareness and Auditor training kit
Presentation transcript:

PhoenixPro Procurement. technology. contracts. projects.

PhoenixPro Procurement. technology. contracts. projects.

Roadmap to ISO27001 Certification Initial Interviews Define ISMS Scope & Objectives Define ISMS Policy Statement Management Sign-off ISMS Foundation Asset Register Threat & Vulnerability Analysis Business Impact Analysis Risk Assessment Risk Treatment Plan Statement of Applicability Gap Analysis Management Approval Planning & Risk Analysis Implementation Plan Process Controls Security Solutions Vulnerability Management and Attack & Penetration Awareness & User Training Evidence Gathering Implementation Planning & Execution Internal Audit Control Effectiveness Review Pre Audit Review & Evaluation Internal "Mock" Review Management Review Pre Audit Preparations Readiness for Certification Audit ISMS Quality Assurance

Practical Tips & Hints PhoenixPro Why do it? Is it worth it? How technical is the external certification audit? Is it “all or nothing”? I am compliant, how do I justify certification? Why not do it on our own? Type of resources needed? Key Areas to Watch ISO27001 is not shelf ware Policies means €€€€s!!! All “Assessments” need to be fair DR / BCP a particular challenge Outsourcing is allowed WITH SLAs Procurement. Contracts. Technology. Projects.

PhoenixPro Procurement. technology. contracts. projects. Georgios A. korellis gakorellis@phoenixpro.com PhoenixPro Procurement. technology. contracts. projects.