Consultancy.

Slides:



Advertisements
Similar presentations
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Advertisements

Agenda What is Compliance? Risk and Compliance Management
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
1 The critical challenge facing banks and regulators under Basel II: improving risk management through implementation of Pillar 2 Simon Topping Hong Kong.
1 Vendor Evaluation: Selecting for Success Dana McCormick Wells Fargo Home Mortgage Delivery Services Baltimore PCC Education Seminar April 27, 2007.
Quality Management System SEETHARAM- Quality Assurance
Security Controls – What Works
Viewpoint Consulting – Committed to your success.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
First Practice - Information Security Management System Implementation and ISO Certification.
The Information Systems Audit Process
Training.
Information Technology Audit
Internal Auditing and Outsourcing
ISO 9001 Auditing Practices Group
Reinventing with Outsourcing YES BANK Experience Balaji V Vice President, Business Services July 4, 2005.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Adaptive Processes Simpler, Faster, Better 1 Adaptive Processes Understanding Information Security ISO / BS7799.
SecureAware Building an Information Security Management System.
Evolving IT Framework Standards (Compliance and IT)
OECD Guidelines on Insurer Governance
Advanced Diploma of Financial Planning Copyright TAFE 2014 Advanced Diploma of Financial Planning.
“Mitigating Offshoring Risks in a Global Business Environment“
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Security Policy Evaluation Using Balanced Scorecards Mohamad El Osta MBA 737 April 29, 2008.
Copyrights I Global Manager Group | Revision 0.1 Feb 2009 | 1 GMG DEMO OF ISO: ENERGY MANAGEMENT SYSTEM AUDITOR TRAINING PRESENTATION KIT.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Challenges in Infosecurity Practices at IT Organizations
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Conducting Compliance Assessments and Building Internal Controls In Pharmaceutical R&D Third Annual Medical Research Summit – Session 2.01 Michael Swiatocha.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
State Diamond Trader Strategic Plan 2012/13. Introduction The State Diamond Trader (SDT): Has been in operation for 5 years Has 92 registered clients.
IT Controls Global Technology Auditing Guide 1.
Solutions4Business Inc. “Your Consulting Partner for Strategic Supply Chain Initiatives” Mark Hehl Senior Consultant Solutions4Business Inc.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Chapter 8 Auditing in an E-commerce Environment
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Overview of Good Regulatory Practice Kent Shigetomi Office of the U.S. Trade Representative.
ISO :2015 Documentation kit for Accreditation of Certifying Body - by Global Manager Group
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CMMI Certification - By Global Certification Consultancy.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Primary Steps for Achieving ISO Certification.
ISO Certification For Laboratory Accreditation ISO Certification For Laboratory Accreditation.
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Learn Your Information Security Management System
GDPR Awareness and Training Workshop
Group No.2 Sagar 07 Husain 08 Sunil 09 Arup 10 Rahul 11 Saad 12
Overview of ISO 9001:2015 –Quality Management SysteM
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Consultancy

Consultancy Banking Process Consultancy Quality Management System (QMS) IT Governance Information Security Management System (ISMS) ISO 9001/ 27001/ BS25999 Implementation Risk Assessment and Mitigation RFP management

Banking Process Introduction Market Drivers An evolving industry – undergoing rapid transformation Increasing regulation - Initiatives such as Basel II, etc. Globalization - heavier trade volumes and 24/7 operations Commoditization of instruments – less margins, sophisticated instruments, more competitive pricing

Banking Process Business Drivers Revenue growth - to increase revenues with less margins Risk management – more stringent regulations and to manage risk early Cost control – In particular banks seek to: Keep headcount low – run processes more effectively by managing exceptions. Increase productivity – enable existing staff to work more efficiently Decrease system costs – by using efficient systems to reduce deployment costs. Analytics – Banks need analysis of the market, history, etc., to decide on the price in the competitive market

Banking Process What we can do? Review of existing processes Gap analysis Revision of existing processes Development of new processes Implementation of modified/ new processes

Banking Process Benefits to the clients Better processes Globally standard practices Adequate internal controls Compliance facilitation Achieving the market and business goals/ drivers Alignment of IT strategy with business strategy Back

Quality Management System (QMS) Introduction QMS is necessary for any organization for the following needs. Refined Processes – the need of the hour for the clients Global best practices Certifications Improved efficiency

Quality Management System (QMS) What we can do? Training Programs General Specific as per requirement Consultancy on specific areas like Review of existing processes Gap analysis Revision of existing processes Development of new processes Implementation of modified/ new processes

Quality Management System (QMS) What we can do? Metrics management Corrective and Preventive actions Quality Manual preparation Development of policies, procedures and guidelines Internal Audit and External Audit coordination Implementation facilitation till certification like CMMi, ISO 9001-2000, etc.

Quality Management System (QMS) Benefits to the clients Integrated Quality Management System, meeting the requirements of world class quality models Provide ample space for flexibility and creativity Adherence to SLA to ensure RoI Greater degree of predictability through processes and reuse Continuous improvements through better QMS and Breakthrough improvements through Six Sigma Back

IT Governance Introduction An effective IT Governance model will be the one that is carefully planned keeping in view the international best practices as well as the organizational requirements and implemented.

IT Governance What we can do? Review of existing Governance Model or defining a new one keeping in view the international best practices and the specific needs of the organization Conducting the Gap analysis Revision of existing model Development of new processes/ guidelines to address the gaps Implementation of modified/ new processes Keeping in place a monitoring mechanism

IT Governance Benefits to the clients Enable the monitoring and strategic development of the IT Governance Models for optimum and most secure usage of IT Provide for better monitoring of and compliance with Contractual, legal and operational risk requirements Alignment of IT strategy with business strategy Back

Information Security Management System (ISMS) Introduction Protecting Information is the most critical function of the organizations as it is the most valuable asset of the organizations. Whether it is customer data, software or hardware and the networks used apart from the physical assets and all important people (employees) careful planning and systems are required to ensure their availability, integrity and confidentiality (depending upon the nature of the asset). ISMS will ensure the above, once it is planned in tune with the international best practices and the organizational needs.

Information Security Management System (ISMS) What we can do? Review of existing policies, procedures etc that take care of Information Security and comparing with the international standards and the organizational needs Gap analysis Revision of existing policies/ procedures or defining new ones Implementation of the same Institutionalising mechanism to monitor, evaluate and review the same periodically Facilitation to the organization for complying with and getting certified for ISO 27001

Information Security Management System (ISMS) Benefits to the clients Better processes Globally standard practices Adequate internal controls Compliance facilitation Achieving the market and business goals/ drivers Alignment of IT strategy with business strategy

ISO 9001/ 27001/ BS25999 Implementation Introduction We offer facilitation services for enabling the organizations to get certified under International Standards in Quality, Information Security and Business Continuity. Our consultants will help the organizations to understand the standards, map the organization’s requirements to the standards and define/ refine policies/ processes to ensure that they comply with all the requirements of the standard. We will hand-hold your employees in the implementation process and enable them to successfully face the certification audits leading to certifications in the respective systems.

ISO 9001/ 27001/ BS25999 Implementation What we can do? Review of existing processes Gap analysis Revision of existing processes Development of new processes Implementation of modified/ new processes

ISO 9001/ 27001/ BS25999 Implementation Benefits to the clients Better processes Globally standard practices Adequate internal controls Compliance facilitation Achieving the market and business goals/ drivers Alignment of IT strategy with business strategy

Risk Assessment and Mitigation Introduction In the current pace of technological development in Information Technology, new threats are being constantly faced by organization to their information assets with a potential risk of losing or compromising on information assets which may lead to different losses including possible closure of business. We offer a comprehensive range of services that will help organizations in identifying potential risks and we also will recommend necessary mitigation measures to reduce the risks.

Risk Assessment and Mitigation What we can do? Asset Identification and analysis Identification of threats and vulnerabilities through series of studies/ tests Assessment of Risks Measure the risks and evolve the risk matrix Provide expert guidance on ways to mitigate the risks

Risk Assessment and Mitigation The benefit to the clients Proactively identifying the risks and taking steps to mitigate them Reduction in losses Comfort to the management on the much needed Risk Management Compliance to client/ regulatory requirements Back

Introduction RFP Management Procurement management is key for ensuring obtention of required products/ services at an optimum ToC and not compromising on the quality Not all the clients are specialised in this area/ process

RFP Management What we can do? RFx preparation with detailed functional and technical requirements and including global bidding standards Evaluation of vendors with scientific approach considering various parameters and weights Managing vendors Conducting UAT Procurement Audit

The benefit to the clients External professional services in the procurement Service augmentation at the need of the hour Professional and unbiased approach