SlideShare a Scribd company logo
1 of 25
Starting Points with
the implementation of
ISO Standard
About me:
• ISO Standards Implementer
• ISO Standards Auditor
• Best Practices Consultant
• ITIL Expert
Presenter: Jose Espinal
jose.espinal@learningk.org
Agenda
• Analyze the status of the IT Area
• Needings from Company and environment
• ITIL Process and Lifecycle
• Choosing the right standard
Analyze the status of the IT Area
What we can find ?
In majority of the companies which uses IT, they already started with:
Reading about Best practices and advices
Training with popular courses
Reading and implementing methodologies
Adapting the IT to the new challenges
Analyze the status of the IT Area
Different results in differents companies.
(IT) Dear General Manager, we
need your Support to implement
some improvements to IT
(GM) Ok, go on !!! But don’t
bother me… i’m so busy
(IT personnel) Dear IT Manager, we need
your Support to implement some
improvements from the training
(IT Manager) Ok, go on !!! If is free and
you can do your other tasks too..
(IT Manager) Everything is
fine… I only want to
reduce the costs
Analyze the status of the IT Area
GM: Sending the
personnel for a course is
more than enough IT: Now, I need resources
to implement what I
have learned
GM: How much? Which
is my benefit/ROI
IT: Everything is going to
run smooth !!
GM: Hummm…..
For the true support of
the General Management
is required their
involvement and make
project owners
Analyze the status of the IT Area
Objective's for….
General management: More business and money… less problems
Legal department: Less demands & lawsuit
Marketing department: Better impact campaigns & Sales
Sales department: More sales and better relation with customers
Human resources: Handle records and no problems
Factories and logistics: Improve business process
IT: worry about actual and future status and services
Analyze the status of the IT Area
Different started points:
• Processes
• Identify a catalog of IT Services
• Making a Risk assessment
But… what are the needing of the company?
Sometimes, IT area enforce to implement improvements with a weak
communication with other departments of the company
Started with processes
ROLESACTIVITIES
INPUTS
OUTPUTS
TRIGGERS
PROCESS
ENHANCINGS
CONTROL
Procedures
Work Instructions
Metrics
Improvements
Owner
Documentation
Objetives
Results
Resources Capabilities
In majority of cases, the IT
department started with
one or several processes
and maturity It’s not so
high:
Documentation
Procedures
Results
Improvements
And more
Started with processes
ROLESACTIVITIES
Users
Solved
incidents
TRIGGERS
PROCESS
ENHANCINGS
CONTROL
DB for Incident registration
How-to: main incidents
Metrics: percentage solving without re-routing
Future improvements: reducing time with
auto-detection system
Owner: Mr Smith
Incident Policy
Solve the incident as soon as possible
Average solving time: 4:30hrs
DB tool-ticketing Trained personnel
Incident management is one
of the most common
processes stablished.
Majority of times, the
process is not
communicated, followed,
incidents are not registered,
documents are lost or not
used, not declared a
responsible or don’t know
their role.
Needing’s from Company and environment
Needing's for….
General management: Increase the value and public image of the company
Legal department: Meet the legal requirements
Marketing department: Improve campaigns and value of trademarks
Sales department: Increase customers and the sales
Human resources: provide better services and understand the requirements
Factories and logistics: improve the quality and performance
IT: Control the environment providing the IT Services
Needing’s from Company and environment
All the opinions are important but the final decision is from General
Management:
Security of the
information
Services
provided
from IT
Protecting
the
continuity of
the business
Security of the information can cover:
I+D
Workers information
Work realized
Customers information
Security in the physical areas of the business
And more…
Protecting the continuity of the business
Protecting the creation and distribution of our products and services
Protecting the Working areas
How to handle a disaster
And more…
Services provided from IT:
Protecting the information of the company
Control the working environment of our employees
Providing best quality to our customers from the IT
And more…
Needing’s from Company and environment
Management
System
Involvements
from
interested
Involvement
from
customers
Involvement
from General
Management
The proposed standard is to create a certifiable
management system with the contribution of
the different processes, tasks and people to
protect the health of a company and its
activities.
It’s not only an IT affair.
ITIL Process and Lifecycle
ITIL is a framework which provides best practices for IT Service
Management.
Best practices are implemented in companies around the world and
benefits are recognized.
It’s oriented to the IT area of any company.
ITIL only offers certification for Persons, no companies.
Companies can implement the process / services under the ITIL
descriptions but there’s no standard way to measure if is correctly
applied and other industries recognition.
ITIL Process and Lifecycle
ITIL proposes a treatment of IT services through the life
cycle management of services and different processes
interact.
For a public recognition of the IT service it is necessary to
establish a management system as described in the
standard.
ISO / IEC 20.000 standard proposes a management system
of IT services. It has great similarities with ITIL but are not
the same thing
ITIL Process and Lifecycle
Companies that began with the implementation of
ITIL processes will begin with an interesting
development and maturity that will facilitate the
implementation of the requirements described in ISO
20000 standard and other standards such as ISO
27001 and ISO 22301.
But ITIL is not the starting point to implement the
standards
Experience 1: An IT company
A company delivery their IT Services
across Internet. They maintain and
administer Applications, Email
Mailboxes and Websites to end
clients (Customers)
Our customers
value us for the
reliability of our
services
We need resources and
tools to solve any problem
in the shortest time
possible
Manager
IT Support
Sales
We can increase
our customers if
we get a
certification
After considering different options,
they decided to implement the
management system for e-mail
service. Once the external auditors
were certified, in a next phase they
included in the management system
the websites hosting services. They
increase customers and reputation.
Experience 2: A non IT company
A company delivery their products
to the customers in different ways.
They maintain a production factory,
logistics and a network of
distributors.
Our customers
value us because
the quality of our
products
Because of a
flood, our factory
was disabled
Manager
External
parties
Marketing
For our customers it is
important delivery
performance and quality
of our productsAfter considering different options,
they decided to implement the
management system for the main
factory. Few months later, they
suffered a flood and the company
success reactivating and distributing
their products in few hours.
During the
reconstruction, we had
overworked, complaints
and loss of reputation
and customers
Sales
Experience 3: A non IT company
A finance company was concerned about
the low control over the information it
manages. They are aware of the danger by
another company that suffered theft of
confidential customer information and
had lost. They took the decision to
implement a management system for
information security
Our customers
value us for the
good services
We must protect the
confidential protection
used by our employees and
stored in our systems
Manager
IT Support
Marketing
Our ISO 27001
certification is an
adventage for our
customers
After implementing the management
system of information security, they could
address various weaknesses. Some
employees took confidential information
to work from home, where they had virus
infections. They were able to control
personal information to avoid claims from
clients or employees for improper use of
data privacy.
Benefits management system were used
by marketing to get new customers
Choosing the right standard
False sense of security:
Sometimes, we think about our
measures are working.
1.- We need an Emergency Exit
2.- Sometimes employees uses this
door to go out and is opened
sometimes.
3.- We protect that door with locks
Choosing the right standard
False sense of control:
Some machines are dangerous when
employees are not trained.
1.- We implement one training for the
3 operators last June.
2.- We hired one employee last July.
3.- Our 3 operators…:
1 was fired
1 was on summer holiday
1 was helping with a fast training to the
new employee
So that last employee is using the
machine without the proper training
(risk of accident, breaking the
machine, etc.)
Choosing the right standard
False sense of business protection:
1.- Factory operators are the most
important
2.- Computers fails sometimes and we
can repair.
3.- A virus-worm infected the
administrative area and reach the 3
computers in the factory which controls
production machinery. 120 Operator
cannot work during 2 days.
4.- Company needed to pay extra time
for that workers during one week to
reach the production objectives.
Choosing the right standard
False sense of control:
1.- Little by little we was increasing the
number of servers, routers and other
devices.
2.- Technicians just install. They think are
fine to control the situation.
3.- Things were ok, not so much incidents
and managers didn’t worry so much.
4.- They needed to move to another servers
room, they have:
• Several breakdowns of network
• 1 month of down security firewalls
• >500 incidents during 2 months
• 3 experienced technicians leaving the
company
Choosing the right standard
Now, it’s time to take decisions.
Thank you
jose.espinal@learningk.org
www.learningk.comwww.pecb.com

More Related Content

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

PECB Webinar: ISO 20000/22301/27001 & ITIL: Starting point and experiences

  • 1.
  • 2. Starting Points with the implementation of ISO Standard About me: • ISO Standards Implementer • ISO Standards Auditor • Best Practices Consultant • ITIL Expert Presenter: Jose Espinal jose.espinal@learningk.org
  • 3. Agenda • Analyze the status of the IT Area • Needings from Company and environment • ITIL Process and Lifecycle • Choosing the right standard
  • 4. Analyze the status of the IT Area What we can find ? In majority of the companies which uses IT, they already started with: Reading about Best practices and advices Training with popular courses Reading and implementing methodologies Adapting the IT to the new challenges
  • 5. Analyze the status of the IT Area Different results in differents companies. (IT) Dear General Manager, we need your Support to implement some improvements to IT (GM) Ok, go on !!! But don’t bother me… i’m so busy (IT personnel) Dear IT Manager, we need your Support to implement some improvements from the training (IT Manager) Ok, go on !!! If is free and you can do your other tasks too.. (IT Manager) Everything is fine… I only want to reduce the costs
  • 6. Analyze the status of the IT Area GM: Sending the personnel for a course is more than enough IT: Now, I need resources to implement what I have learned GM: How much? Which is my benefit/ROI IT: Everything is going to run smooth !! GM: Hummm….. For the true support of the General Management is required their involvement and make project owners
  • 7. Analyze the status of the IT Area Objective's for…. General management: More business and money… less problems Legal department: Less demands & lawsuit Marketing department: Better impact campaigns & Sales Sales department: More sales and better relation with customers Human resources: Handle records and no problems Factories and logistics: Improve business process IT: worry about actual and future status and services
  • 8. Analyze the status of the IT Area Different started points: • Processes • Identify a catalog of IT Services • Making a Risk assessment But… what are the needing of the company? Sometimes, IT area enforce to implement improvements with a weak communication with other departments of the company
  • 9. Started with processes ROLESACTIVITIES INPUTS OUTPUTS TRIGGERS PROCESS ENHANCINGS CONTROL Procedures Work Instructions Metrics Improvements Owner Documentation Objetives Results Resources Capabilities In majority of cases, the IT department started with one or several processes and maturity It’s not so high: Documentation Procedures Results Improvements And more
  • 10. Started with processes ROLESACTIVITIES Users Solved incidents TRIGGERS PROCESS ENHANCINGS CONTROL DB for Incident registration How-to: main incidents Metrics: percentage solving without re-routing Future improvements: reducing time with auto-detection system Owner: Mr Smith Incident Policy Solve the incident as soon as possible Average solving time: 4:30hrs DB tool-ticketing Trained personnel Incident management is one of the most common processes stablished. Majority of times, the process is not communicated, followed, incidents are not registered, documents are lost or not used, not declared a responsible or don’t know their role.
  • 11. Needing’s from Company and environment Needing's for…. General management: Increase the value and public image of the company Legal department: Meet the legal requirements Marketing department: Improve campaigns and value of trademarks Sales department: Increase customers and the sales Human resources: provide better services and understand the requirements Factories and logistics: improve the quality and performance IT: Control the environment providing the IT Services
  • 12. Needing’s from Company and environment All the opinions are important but the final decision is from General Management: Security of the information Services provided from IT Protecting the continuity of the business Security of the information can cover: I+D Workers information Work realized Customers information Security in the physical areas of the business And more… Protecting the continuity of the business Protecting the creation and distribution of our products and services Protecting the Working areas How to handle a disaster And more… Services provided from IT: Protecting the information of the company Control the working environment of our employees Providing best quality to our customers from the IT And more…
  • 13. Needing’s from Company and environment Management System Involvements from interested Involvement from customers Involvement from General Management The proposed standard is to create a certifiable management system with the contribution of the different processes, tasks and people to protect the health of a company and its activities. It’s not only an IT affair.
  • 14. ITIL Process and Lifecycle ITIL is a framework which provides best practices for IT Service Management. Best practices are implemented in companies around the world and benefits are recognized. It’s oriented to the IT area of any company. ITIL only offers certification for Persons, no companies. Companies can implement the process / services under the ITIL descriptions but there’s no standard way to measure if is correctly applied and other industries recognition.
  • 15. ITIL Process and Lifecycle ITIL proposes a treatment of IT services through the life cycle management of services and different processes interact. For a public recognition of the IT service it is necessary to establish a management system as described in the standard. ISO / IEC 20.000 standard proposes a management system of IT services. It has great similarities with ITIL but are not the same thing
  • 16. ITIL Process and Lifecycle Companies that began with the implementation of ITIL processes will begin with an interesting development and maturity that will facilitate the implementation of the requirements described in ISO 20000 standard and other standards such as ISO 27001 and ISO 22301. But ITIL is not the starting point to implement the standards
  • 17. Experience 1: An IT company A company delivery their IT Services across Internet. They maintain and administer Applications, Email Mailboxes and Websites to end clients (Customers) Our customers value us for the reliability of our services We need resources and tools to solve any problem in the shortest time possible Manager IT Support Sales We can increase our customers if we get a certification After considering different options, they decided to implement the management system for e-mail service. Once the external auditors were certified, in a next phase they included in the management system the websites hosting services. They increase customers and reputation.
  • 18. Experience 2: A non IT company A company delivery their products to the customers in different ways. They maintain a production factory, logistics and a network of distributors. Our customers value us because the quality of our products Because of a flood, our factory was disabled Manager External parties Marketing For our customers it is important delivery performance and quality of our productsAfter considering different options, they decided to implement the management system for the main factory. Few months later, they suffered a flood and the company success reactivating and distributing their products in few hours. During the reconstruction, we had overworked, complaints and loss of reputation and customers Sales
  • 19. Experience 3: A non IT company A finance company was concerned about the low control over the information it manages. They are aware of the danger by another company that suffered theft of confidential customer information and had lost. They took the decision to implement a management system for information security Our customers value us for the good services We must protect the confidential protection used by our employees and stored in our systems Manager IT Support Marketing Our ISO 27001 certification is an adventage for our customers After implementing the management system of information security, they could address various weaknesses. Some employees took confidential information to work from home, where they had virus infections. They were able to control personal information to avoid claims from clients or employees for improper use of data privacy. Benefits management system were used by marketing to get new customers
  • 20. Choosing the right standard False sense of security: Sometimes, we think about our measures are working. 1.- We need an Emergency Exit 2.- Sometimes employees uses this door to go out and is opened sometimes. 3.- We protect that door with locks
  • 21. Choosing the right standard False sense of control: Some machines are dangerous when employees are not trained. 1.- We implement one training for the 3 operators last June. 2.- We hired one employee last July. 3.- Our 3 operators…: 1 was fired 1 was on summer holiday 1 was helping with a fast training to the new employee So that last employee is using the machine without the proper training (risk of accident, breaking the machine, etc.)
  • 22. Choosing the right standard False sense of business protection: 1.- Factory operators are the most important 2.- Computers fails sometimes and we can repair. 3.- A virus-worm infected the administrative area and reach the 3 computers in the factory which controls production machinery. 120 Operator cannot work during 2 days. 4.- Company needed to pay extra time for that workers during one week to reach the production objectives.
  • 23. Choosing the right standard False sense of control: 1.- Little by little we was increasing the number of servers, routers and other devices. 2.- Technicians just install. They think are fine to control the situation. 3.- Things were ok, not so much incidents and managers didn’t worry so much. 4.- They needed to move to another servers room, they have: • Several breakdowns of network • 1 month of down security firewalls • >500 incidents during 2 months • 3 experienced technicians leaving the company
  • 24. Choosing the right standard Now, it’s time to take decisions.

Editor's Notes

  1. Introduction myself. Background and experiences
  2. Explaining the Agenda
  3. Explaining different actions from different companies