SlideShare a Scribd company logo
1 of 64
Welcome To The User Awareness Training Of ISMS ISO/IEC 27001:2005 Saroj Ku. Behera 9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
'Information is an asset which, like other important business assets, has value to  an organization and consequently needs  to be suitably protected’ BS ISO 27002:2005 9/16/2010 Saroj
Information can be ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],‘… Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected’ (BS ISO 27002:2005) 9/16/2010 Saroj
What Is Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],What Is Information Security ,[object Object],[object Object],[object Object],9/16/2010 Saroj
PEOPLE PROCESSES TECHNOLOGY Organization Staff Business Processes Technology used by Organisation 9/16/2010 Saroj
People “Who we are” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Process “what we do” The processes refer to "work practices" or workflow. Processes are the repeatable steps to accomplish business objectives. Typical process in our IT Infrastructure could include: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Technology “what we use to improve what we do” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Technology “what we use to improve what we do” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],Business survival depends on information security. INFORMATION SECURITY 9/16/2010 Saroj
ISO 27002:2005 defines Information Security as the preservation of: ,[object Object],Ensuring that information is accessible only to those authorized to have access ,[object Object],Safeguarding the accuracy and completeness of information and processing methods ,[object Object],Ensuring that authorized users have access to information and associated assets when required 9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security breaches leads to… LOSS OF GOODWILL 9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
What is Risk? Risk : A possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset. Threat : Something that can potentially cause damage to the organization, IT Systems or network. Vulnerability : A weakness in the organization, IT Systems, or network that can be exploited by a threat. 9/16/2010 Saroj
Relationship between Risk, Threats, and Vulnerabilities Threats Vulnerabilities exploit * Controls:  A practice, procedure or mechanism that reduces risk Risk Asset values Protection Requirements increase increase Information assets Controls * expose protect against reduce have increase indicate met by 9/16/2010 Saroj
Threat Identification ,[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Threat Identification ,[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Threat Identification ,[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Threat Sources 9/16/2010 Saroj  Source Motivation Threat External Hackers Challenge  Ego  Game Playing System hacking  Social engineering  Dumpster diving Internal Hackers Deadline  Financial problems  Disenchantment Backdoors  Fraud  Poor documentation Terrorist Revenge  Political  System attacks  Social engineering  Letter bombs  Viruses  Denial of service Poorly trained employees Unintentional errors  Programming errors  Data entry errors Corruption of data  Malicious code introduction  System bugs  Unauthorized access
9/16/2010 Saroj  No Categories of  Threat Example 1 Human Errors or failures Accidents,  Employee mistakes 2 Compromise to Intellectual Property Piracy, Copyright infringements 3 Deliberate Acts or espionage or trespass Unauthorized Access and/or  data collection 4 Deliberate Acts of Information extortion Blackmail of information exposure / disclosure 5 Deliberate Acts of sabotage /  vandalism Destruction of systems / information 6 Deliberate Acts of theft Illegal confiscation of  equipment or information 7 Deliberate software attacks Viruses, worms,  macros Denial of service 8 Deviations in quality of service from service provider Power and WAN issues 9 Forces of nature Fire, flood, earthquake, lightening 10 Technical  hardware failures or errors Equipment failures / errors 11 Technical software failures or errors Bugs, code problems,  unknown loopholes 12 Technological  Obsolence Antiquated  or  outdated technologies
High User Knowledge of IT Systems Theft, Sabotage, Misuse Virus Attacks Systems & Network Failure Lack Of Documentation Lapse in Physical Security Natural Calamities & Fire 9/16/2010 Saroj
SO HOW DO WE OVERCOME THESE PROBLEMS? 9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],History 9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],History 9/16/2010 Saroj
ISO 27001: This International Standard covers all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations). This  International Standard specifies the requirements for establishing; implementing, operating, monitoring, reviewing, maintaining and improving documented ISMS within the context of the organization’s overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.   The ISMS is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties ISO 27001 9/16/2010 Saroj
Features of ISO 27001    • Plan, Do, Check, Act (PDCA) Process Model • Process Based Approach  • Stress on Continual Process Improvements • Scope covers Information Security not only IT Security • Covers People, Process and Technology • 5600 plus organizations worldwide have been certified • 11 Domains, 39 Control objectives, 133 controls   Features 9/16/2010 Saroj
9/16/2010 Saroj  Interested Parties Information Security Requirements & Expectations PLAN Establish  ISMS CHECK Monitor &  Review ISMS ACT Maintain & Improve Management Responsibility ISMS PROCESS PDCA Process Interested Parties Managed Information Security DO Implement & Operate the ISMS
Information Security Policy Organisation of Information Security Asset Management Human Resource Security Physical Security  Communication & Operations Management Access Control System Development & Maintenance Incident Management Business Continuity Planning Compliance Confidentiality Integrity Availability 9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],9/16/2010 Saroj
IS POLICY SECURITY ORGANISATION ASSET IDENTIFICATION & CLASSIFICATION CONTROL SELECTION & IMPLEMENTATION OPERATIONALIZE THE PROCESES MANAGEMENT REVIEW CORRECTIVE & PREVENTIVE ACTIONS CHECK PROCESSES 9/16/2010 Saroj  PLAN Establish  ISMS CHECK Monitor &  Review ISMS ACT Maintain & Improve DO Implement & Operate the ISMS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
ISMS @ ORGANISATION ,[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
ISMS @ ORGANISATION ,[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
ISMS @ ORGANISATION Vision ORGANISATION would be a role model for having robust Information Security Management System Implementation with continual improvements, which assure and pervade very sphere of its activities and functional domains. Mission Empowerment of Information Security Management System through implementing best practices for People, Process and Technology.  Information Security is responsibility of everyone 9/16/2010 Saroj
ISMS @ ORGANISATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISMS @ ORGANISATION 9/16/2010 Saroj
WHO IS AT THE CENTRE OF SECU RITY U - R 9/16/2010 Saroj
Information Security Policy IS Policy is approved by Top Management  Policy is released on Intranet at 9/16/2010 Saroj
CONFIDENTIAL :  If this information is leaked outside Organisation, it will result in major financial and/or image loss. Compromise of this information will result in statutory, legal non- compliance. Access to this information must be restricted based on the concept of need-to-know. Disclosure requires the information owner’s approval. In case information needs to be disclosed to third parties a signed confidentiality agreement is also required. Examples include Customer contracts, rate tables, process documents and new product development plans.  INTERNAL USE ONLY:   If this information is leaked outside Organisation, it will result in Negligible financial loss and/or embarrassment. Disclosure of this information shall not cause serious harm to Organisation, and access is provided freely to all internal users.  Examples include circulars, policies, training materials etc.  PUBLIC:   Non availability will have no effect. If this information is leaked outside Organisation, it will result in no loss. This information must be explicitly approved by the Corporate Communications Department or Marketing Department in case of marketing related information, as suitable for public dissemination. Examples include marketing brochures, press releases. 9/16/2010 Saroj  Information Asset Classification
Confidentiality - Information Asset Confidentiality of information refers to the protection of information from unauthorized disclosure. The impact of unauthorized disclosure of confidential information can range from jeopardizing organization security to the disclosure of private data of employees. Following table provides guideline to determine Confidentiality requirements:  9/16/2010 Saroj  Confidentiality Requirement Explanation Low Non-sensitive information available for public disclosure. The impact of unauthorized disclosure of such information shall not harm Organisation anyway. E.g. Press releases, Company’s News letters e.g. Information published on company’s website Medium Information belonging to the company and not for disclosure to public or external parties. The unauthorized disclosure of information here can cause a limited harm to the organization.  e.g. Organization Charts, Internal Telephone Directory. High Information which is very sensitive or private, of highest value to the organization and intended to use by named individuals only. The unauthorized disclosure of such information can cause severe harm (e.g. Legal or financial liability, adverse competitive impact, loss of brand name). E.g. Client’s pricing information, Merger and Acquisition related information, Marketing strategy
Integrity - Information Asset Integrity refers to the completeness and accuracy of Information. Integrity is lost if unauthorized changes are made to data or IT system by either intentional or accidental acts. If integrity of data is not restored back, continued use of the contaminated data could result in inaccuracy, fraud, or erroneous decisions. Integrity criteria of information can be determined with guideline established in the following Table. 9/16/2010 Saroj  Integrity Requirement Explanation Low There is minimal impact on business if the accuracy and completeness of data is degraded. Medium There is significant impact on business if the asset if the accuracy and completeness of data is degraded. High The Integrity degradation is unacceptable.
Availability - Information Asset Availability indicates how soon the information is required, in case the same is lost. If critical information is unavailable to its end users, the organization’s mission may be affected. Following Table provides guideline to determine availability criteria of information assets. 9/16/2010 Saroj  Availability Requirement Explanation Low There is minimal impact on business if the asset / information is not Available for up to 7 days Medium There is significant impact on business if the asset / information is not Available for up to 48 hours High The Asset / information is required on 24x7 basis
Non-information Assets [Physical] Information is processed with the help of technology. The assets, which are helpful in creating, processing, output generation and storage. Such assets need to be identified and valued for the purpose of their criticality in business process. Asset valuation of non information / physical Assets like software, Hardware, Services is carried out based on different criteria applicable to the specific group of physical assets involved in organization’s business processes. 9/16/2010 Saroj
Confidentiality - Non-information Asset Confidentiality factor is to be determined by the services rendered by the particular asset in specific business process and the confidentiality requirement of the information / data processed or stored by the asset. This table provides a guideline to identify the Confidentiality requirements and its link to Classification label. 9/16/2010 Saroj  Confidentiality Requirement Explanation Low Information processed / stored / carried or services rendered by the asset in the business process have confidentiality requirements as LOW. Medium Information processed / stored / carried or services rendered by the asset in the business process have confidentiality requirements as Medium. High Information processed / stored / carried or services rendered by the asset in the business process have confidentiality requirements as HIGH.
Integrity - Non Information Asset Integrity factor is to be determined by the reliability and dependability of the particular asset in specific business process and the Integrity requirement of the information / data processed or stored by the asset. This table provides a guideline to identify the Integrity requirements and its link to Classification label. 9/16/2010 Saroj  Integrity Requirement Explanation Low Dependency and reliability of the services rendered by the particular asset in a business process is LOW. Information processed / stored / carried or services rendered by the asset in the business process have Integrity requirements as LOW. Medium Dependency and reliability of the services rendered by the particular asset in a business process is Medium. Information processed / stored / carried or services rendered by the asset in the business process have Integrity requirements as Medium. High Dependency and reliability of the services rendered by the particular asset in a business process is HIGH. Information processed / stored / carried or services rendered by the asset in the business process have Integrity requirements as High.
Availability - Non-information Asset Availability factor is to be determined on the basis of impact of non availability of the asset on the business process. This table provides a guideline to identify the Availability requirements and its link to Classification label.  9/16/2010 Saroj  Integrity Requirement Explanation Low Impact of non availability of an asset in a business process is LOW. Information processed / stored / carried or services rendered by the asset in the business process have Availability requirements as LOW. Medium Impact of non availability of an asset in a business process is Medium. Information processed / stored / carried or services rendered by the asset in the business process have Availability requirements as MEDIUM. High Impact of non availability of an asset in a business process is HIGH. Information processed / stored / carried or services rendered by the asset in the business process have Availability requirements as HIGH.
People Assets Information is accessed or handled by the people from within the organization as well as the people related to organization for business requirements.   It becomes necessary to identify such people from within the organization as well as outside the organization who handle the organization’s information assets.   The analysis such people, who has access rights to the assets of the organization, is to be done by Business Process Owner i.e. process / function head. The people assets shall include roles handled by a. Employees b. Contract Employees c. Contractors & his employees 9/16/2010 Saroj
Confidentiality - People Assets 9/16/2010 Saroj  Confidentiality Requirement Explanation Low The role or third party identified has access limited to information assets classified as 'Public'. Security breach by individual/s whom the role is assigned would insignificantly affect the business operations. Medium The role or third party identified has access limited to information assets classified as 'Internal’ and 'Public'. Security breach by individual/s whom the role is assigned would moderately affect the business operations. High The role employee or third party identified has access to all types of information assets including information assets classified as 'Confidential' Or IT Assets classified as 'Critical'. Security breach by individual/s to whom the role is assigned would severely affect the business operations.
Integrity – People Assets 9/16/2010 Saroj  Integrity Requirement Explanation Low The role or third party identified has limited privilege to change information assets classified as 'Internal' or 'Public' and the his work is supervised. Security breach by individual/s to whom the role is assigned would insignificantly affect the business operations. Medium The role or third party identified has privilege to change information assets classified as 'Internal', and 'Public' Security breach by individual/s whom the role is assigned would moderately affect the business operations. High The role or third party identified has privilege to change information assets classified as 'Confidential' Or Change the configuration of IT assets classified as 'Critical' Security breach by individual/s to whom the role is assigned would severely affect the business operations.
Availability – People Assets 9/16/2010 Saroj  Availability Requirement Explanation Low Unavailability of the individual/s whom the role is assigned would have insignificant affect the business operations. Medium Unavailability of the individual/s whom the role is assigned would moderately affect the business operations. High Unavailability of the individual/s whom the role is assigned would severely affect the business operations.
Access Control - Physical ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Password Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Technology Department is continuously monitoring Internet Usage. Any illegal use of internet and other assets shall call for Disciplinary Action. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Usage 9/16/2010 Saroj
E-mail Usage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Security Incidents ,[object Object],[object Object],[object Object],e.g.:  IT Incidents: Mail Spamming, Virus attack, Hacking, etc.  Non-IT Incidents: Unsupervised visitor movement, Information leakage, Bringing unauthorized Media  ,[object Object],[object Object],9/16/2010 Saroj
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],9/16/2010 Saroj
Human Wall Is Always Better Than A Firewall  . . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL 9/16/2010 Saroj
Thanks [email_address] 9/16/2010 Saroj

More Related Content

What's hot

ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...iFour Consultancy
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsPECB
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfSerkanRafetHalil1
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certificationtschraider
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013Ramiro Cid
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementChristian F. Nissen
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 

What's hot (20)

ISO 27701
ISO 27701ISO 27701
ISO 27701
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO Standards
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
CISO PPT
CISO PPTCISO PPT
CISO PPT
 

Viewers also liked

Mandatory CSR- is it great Idea
Mandatory CSR-is it great IdeaMandatory CSR-is it great Idea
Mandatory CSR- is it great IdeaSAROJ BEHERA
 
5 Ways Corporations Benefit from Unified CSR Programs
5 Ways Corporations Benefit from Unified CSR Programs 5 Ways Corporations Benefit from Unified CSR Programs
5 Ways Corporations Benefit from Unified CSR Programs Good Done Great
 
CSR, Smarter Business, and What it Means for Management
CSR, Smarter Business, and What it Means for ManagementCSR, Smarter Business, and What it Means for Management
CSR, Smarter Business, and What it Means for ManagementInnovation Forum Publishing
 
Organisation profile.compressed
Organisation profile.compressedOrganisation profile.compressed
Organisation profile.compressedOnkar K. Khullar
 
Tata csr ... dipanjan roy
Tata csr ...  dipanjan roy Tata csr ...  dipanjan roy
Tata csr ... dipanjan roy DIPANJAN ROY
 
Wishlife: Logic Model For CSR Planning (base version)
Wishlife: Logic Model For CSR Planning (base version)Wishlife: Logic Model For CSR Planning (base version)
Wishlife: Logic Model For CSR Planning (base version)Tushar Tiwari
 
CSR presentation
CSR presentationCSR presentation
CSR presentationAmit Gupta
 
Creating a sustainable and relevant CSR Blueprint
Creating a sustainable and relevant CSR BlueprintCreating a sustainable and relevant CSR Blueprint
Creating a sustainable and relevant CSR BlueprintMark Lee
 
Research Proposal - CSR - The Voice of the Stakeholder
Research Proposal - CSR - The Voice of the StakeholderResearch Proposal - CSR - The Voice of the Stakeholder
Research Proposal - CSR - The Voice of the StakeholderAmany Hamza
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibilitypoonam335
 
CSR Strategy Consulting Approach
CSR Strategy Consulting ApproachCSR Strategy Consulting Approach
CSR Strategy Consulting ApproachAmit Gupta
 
Sample draft PwC partnership proposal
Sample draft PwC partnership proposalSample draft PwC partnership proposal
Sample draft PwC partnership proposalakshay sharma
 
Csr of tata company mod
Csr of tata company modCsr of tata company mod
Csr of tata company modVivek Sinha
 

Viewers also liked (20)

Mandatory CSR- is it great Idea
Mandatory CSR-is it great IdeaMandatory CSR-is it great Idea
Mandatory CSR- is it great Idea
 
Earth is calling! Where are you?
Earth is calling! Where are you?Earth is calling! Where are you?
Earth is calling! Where are you?
 
PPt_CSR
PPt_CSRPPt_CSR
PPt_CSR
 
Final PPT
Final PPTFinal PPT
Final PPT
 
Starbucks in Dk
Starbucks in DkStarbucks in Dk
Starbucks in Dk
 
CSR Presentation
CSR PresentationCSR Presentation
CSR Presentation
 
5 Ways Corporations Benefit from Unified CSR Programs
5 Ways Corporations Benefit from Unified CSR Programs 5 Ways Corporations Benefit from Unified CSR Programs
5 Ways Corporations Benefit from Unified CSR Programs
 
CSR, Smarter Business, and What it Means for Management
CSR, Smarter Business, and What it Means for ManagementCSR, Smarter Business, and What it Means for Management
CSR, Smarter Business, and What it Means for Management
 
Organisation profile.compressed
Organisation profile.compressedOrganisation profile.compressed
Organisation profile.compressed
 
Tata csr ... dipanjan roy
Tata csr ...  dipanjan roy Tata csr ...  dipanjan roy
Tata csr ... dipanjan roy
 
Wishlife: Logic Model For CSR Planning (base version)
Wishlife: Logic Model For CSR Planning (base version)Wishlife: Logic Model For CSR Planning (base version)
Wishlife: Logic Model For CSR Planning (base version)
 
CSR presentation
CSR presentationCSR presentation
CSR presentation
 
Creating a sustainable and relevant CSR Blueprint
Creating a sustainable and relevant CSR BlueprintCreating a sustainable and relevant CSR Blueprint
Creating a sustainable and relevant CSR Blueprint
 
Funday proposal
Funday proposalFunday proposal
Funday proposal
 
Research Proposal - CSR - The Voice of the Stakeholder
Research Proposal - CSR - The Voice of the StakeholderResearch Proposal - CSR - The Voice of the Stakeholder
Research Proposal - CSR - The Voice of the Stakeholder
 
Wenger partnership proposal
Wenger partnership proposalWenger partnership proposal
Wenger partnership proposal
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
 
CSR Strategy Consulting Approach
CSR Strategy Consulting ApproachCSR Strategy Consulting Approach
CSR Strategy Consulting Approach
 
Sample draft PwC partnership proposal
Sample draft PwC partnership proposalSample draft PwC partnership proposal
Sample draft PwC partnership proposal
 
Csr of tata company mod
Csr of tata company modCsr of tata company mod
Csr of tata company mod
 

Similar to Isms awareness training

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Bonagiri Rajitha
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdfChunLei(peter) Che
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09Tammy Clark
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Tony Richardson CISSP
 

Similar to Isms awareness training (20)

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
 
ke-1.pptx
ke-1.pptxke-1.pptx
ke-1.pptx
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 

More from SAROJ BEHERA

Telephone etiquettes
Telephone etiquettesTelephone etiquettes
Telephone etiquettesSAROJ BEHERA
 
Team Work at Office
Team Work at OfficeTeam Work at Office
Team Work at OfficeSAROJ BEHERA
 
Chit Chat at office
Chit Chat at officeChit Chat at office
Chit Chat at officeSAROJ BEHERA
 
Organisational Culture
Organisational CultureOrganisational Culture
Organisational CultureSAROJ BEHERA
 
Leading to innovation
Leading to innovationLeading to innovation
Leading to innovationSAROJ BEHERA
 
Transforming the Boardrooms "Boardroom Effectiveness "
Transforming the Boardrooms "Boardroom Effectiveness"Transforming the Boardrooms "Boardroom Effectiveness"
Transforming the Boardrooms "Boardroom Effectiveness "SAROJ BEHERA
 
Difference between Process and Procedure
Difference between Process and ProcedureDifference between Process and Procedure
Difference between Process and ProcedureSAROJ BEHERA
 
Changing landscape of indian retail
Changing landscape of indian retailChanging landscape of indian retail
Changing landscape of indian retailSAROJ BEHERA
 
Organization Gimmicks
Organization GimmicksOrganization Gimmicks
Organization GimmicksSAROJ BEHERA
 
Training effectiveness- clause 6.2
Training effectiveness- clause 6.2Training effectiveness- clause 6.2
Training effectiveness- clause 6.2SAROJ BEHERA
 
Training effectiveness-ISO Prospective
Training effectiveness-ISO ProspectiveTraining effectiveness-ISO Prospective
Training effectiveness-ISO ProspectiveSAROJ BEHERA
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 

More from SAROJ BEHERA (18)

CAPA
CAPACAPA
CAPA
 
Telephone etiquettes
Telephone etiquettesTelephone etiquettes
Telephone etiquettes
 
Team Work at Office
Team Work at OfficeTeam Work at Office
Team Work at Office
 
Selling skills
Selling skills Selling skills
Selling skills
 
Office etiquette
Office etiquette Office etiquette
Office etiquette
 
Chit Chat at office
Chit Chat at officeChit Chat at office
Chit Chat at office
 
Organisational Culture
Organisational CultureOrganisational Culture
Organisational Culture
 
Leading to innovation
Leading to innovationLeading to innovation
Leading to innovation
 
Transforming the Boardrooms "Boardroom Effectiveness "
Transforming the Boardrooms "Boardroom Effectiveness"Transforming the Boardrooms "Boardroom Effectiveness"
Transforming the Boardrooms "Boardroom Effectiveness "
 
Difference between Process and Procedure
Difference between Process and ProcedureDifference between Process and Procedure
Difference between Process and Procedure
 
Retailing
RetailingRetailing
Retailing
 
Changing landscape of indian retail
Changing landscape of indian retailChanging landscape of indian retail
Changing landscape of indian retail
 
Organization Gimmicks
Organization GimmicksOrganization Gimmicks
Organization Gimmicks
 
Training effectiveness- clause 6.2
Training effectiveness- clause 6.2Training effectiveness- clause 6.2
Training effectiveness- clause 6.2
 
New Trends in HRM
New Trends in HRMNew Trends in HRM
New Trends in HRM
 
Training effectiveness-ISO Prospective
Training effectiveness-ISO ProspectiveTraining effectiveness-ISO Prospective
Training effectiveness-ISO Prospective
 
9001 2008 details
9001 2008 details9001 2008 details
9001 2008 details
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Isms awareness training

  • 1. Welcome To The User Awareness Training Of ISMS ISO/IEC 27001:2005 Saroj Ku. Behera 9/16/2010 Saroj
  • 2.
  • 3. 'Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected’ BS ISO 27002:2005 9/16/2010 Saroj
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. PEOPLE PROCESSES TECHNOLOGY Organization Staff Business Processes Technology used by Organisation 9/16/2010 Saroj
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. What is Risk? Risk : A possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset. Threat : Something that can potentially cause damage to the organization, IT Systems or network. Vulnerability : A weakness in the organization, IT Systems, or network that can be exploited by a threat. 9/16/2010 Saroj
  • 18. Relationship between Risk, Threats, and Vulnerabilities Threats Vulnerabilities exploit * Controls: A practice, procedure or mechanism that reduces risk Risk Asset values Protection Requirements increase increase Information assets Controls * expose protect against reduce have increase indicate met by 9/16/2010 Saroj
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Threat Sources 9/16/2010 Saroj Source Motivation Threat External Hackers Challenge Ego Game Playing System hacking Social engineering Dumpster diving Internal Hackers Deadline Financial problems Disenchantment Backdoors Fraud Poor documentation Terrorist Revenge Political System attacks Social engineering Letter bombs Viruses Denial of service Poorly trained employees Unintentional errors Programming errors Data entry errors Corruption of data Malicious code introduction System bugs Unauthorized access
  • 24. 9/16/2010 Saroj No Categories of Threat Example 1 Human Errors or failures Accidents, Employee mistakes 2 Compromise to Intellectual Property Piracy, Copyright infringements 3 Deliberate Acts or espionage or trespass Unauthorized Access and/or data collection 4 Deliberate Acts of Information extortion Blackmail of information exposure / disclosure 5 Deliberate Acts of sabotage / vandalism Destruction of systems / information 6 Deliberate Acts of theft Illegal confiscation of equipment or information 7 Deliberate software attacks Viruses, worms, macros Denial of service 8 Deviations in quality of service from service provider Power and WAN issues 9 Forces of nature Fire, flood, earthquake, lightening 10 Technical hardware failures or errors Equipment failures / errors 11 Technical software failures or errors Bugs, code problems, unknown loopholes 12 Technological Obsolence Antiquated or outdated technologies
  • 25. High User Knowledge of IT Systems Theft, Sabotage, Misuse Virus Attacks Systems & Network Failure Lack Of Documentation Lapse in Physical Security Natural Calamities & Fire 9/16/2010 Saroj
  • 26. SO HOW DO WE OVERCOME THESE PROBLEMS? 9/16/2010 Saroj
  • 27.
  • 28.
  • 29. ISO 27001: This International Standard covers all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations). This International Standard specifies the requirements for establishing; implementing, operating, monitoring, reviewing, maintaining and improving documented ISMS within the context of the organization’s overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.   The ISMS is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties ISO 27001 9/16/2010 Saroj
  • 30. Features of ISO 27001   • Plan, Do, Check, Act (PDCA) Process Model • Process Based Approach • Stress on Continual Process Improvements • Scope covers Information Security not only IT Security • Covers People, Process and Technology • 5600 plus organizations worldwide have been certified • 11 Domains, 39 Control objectives, 133 controls Features 9/16/2010 Saroj
  • 31. 9/16/2010 Saroj Interested Parties Information Security Requirements & Expectations PLAN Establish ISMS CHECK Monitor & Review ISMS ACT Maintain & Improve Management Responsibility ISMS PROCESS PDCA Process Interested Parties Managed Information Security DO Implement & Operate the ISMS
  • 32. Information Security Policy Organisation of Information Security Asset Management Human Resource Security Physical Security Communication & Operations Management Access Control System Development & Maintenance Incident Management Business Continuity Planning Compliance Confidentiality Integrity Availability 9/16/2010 Saroj
  • 33.
  • 34.
  • 35.
  • 36. IS POLICY SECURITY ORGANISATION ASSET IDENTIFICATION & CLASSIFICATION CONTROL SELECTION & IMPLEMENTATION OPERATIONALIZE THE PROCESES MANAGEMENT REVIEW CORRECTIVE & PREVENTIVE ACTIONS CHECK PROCESSES 9/16/2010 Saroj PLAN Establish ISMS CHECK Monitor & Review ISMS ACT Maintain & Improve DO Implement & Operate the ISMS
  • 37.
  • 38.
  • 39.
  • 40. ISMS @ ORGANISATION Vision ORGANISATION would be a role model for having robust Information Security Management System Implementation with continual improvements, which assure and pervade very sphere of its activities and functional domains. Mission Empowerment of Information Security Management System through implementing best practices for People, Process and Technology. Information Security is responsibility of everyone 9/16/2010 Saroj
  • 41.
  • 42.
  • 43. WHO IS AT THE CENTRE OF SECU RITY U - R 9/16/2010 Saroj
  • 44. Information Security Policy IS Policy is approved by Top Management Policy is released on Intranet at 9/16/2010 Saroj
  • 45. CONFIDENTIAL : If this information is leaked outside Organisation, it will result in major financial and/or image loss. Compromise of this information will result in statutory, legal non- compliance. Access to this information must be restricted based on the concept of need-to-know. Disclosure requires the information owner’s approval. In case information needs to be disclosed to third parties a signed confidentiality agreement is also required. Examples include Customer contracts, rate tables, process documents and new product development plans. INTERNAL USE ONLY: If this information is leaked outside Organisation, it will result in Negligible financial loss and/or embarrassment. Disclosure of this information shall not cause serious harm to Organisation, and access is provided freely to all internal users. Examples include circulars, policies, training materials etc. PUBLIC: Non availability will have no effect. If this information is leaked outside Organisation, it will result in no loss. This information must be explicitly approved by the Corporate Communications Department or Marketing Department in case of marketing related information, as suitable for public dissemination. Examples include marketing brochures, press releases. 9/16/2010 Saroj Information Asset Classification
  • 46. Confidentiality - Information Asset Confidentiality of information refers to the protection of information from unauthorized disclosure. The impact of unauthorized disclosure of confidential information can range from jeopardizing organization security to the disclosure of private data of employees. Following table provides guideline to determine Confidentiality requirements: 9/16/2010 Saroj Confidentiality Requirement Explanation Low Non-sensitive information available for public disclosure. The impact of unauthorized disclosure of such information shall not harm Organisation anyway. E.g. Press releases, Company’s News letters e.g. Information published on company’s website Medium Information belonging to the company and not for disclosure to public or external parties. The unauthorized disclosure of information here can cause a limited harm to the organization. e.g. Organization Charts, Internal Telephone Directory. High Information which is very sensitive or private, of highest value to the organization and intended to use by named individuals only. The unauthorized disclosure of such information can cause severe harm (e.g. Legal or financial liability, adverse competitive impact, loss of brand name). E.g. Client’s pricing information, Merger and Acquisition related information, Marketing strategy
  • 47. Integrity - Information Asset Integrity refers to the completeness and accuracy of Information. Integrity is lost if unauthorized changes are made to data or IT system by either intentional or accidental acts. If integrity of data is not restored back, continued use of the contaminated data could result in inaccuracy, fraud, or erroneous decisions. Integrity criteria of information can be determined with guideline established in the following Table. 9/16/2010 Saroj Integrity Requirement Explanation Low There is minimal impact on business if the accuracy and completeness of data is degraded. Medium There is significant impact on business if the asset if the accuracy and completeness of data is degraded. High The Integrity degradation is unacceptable.
  • 48. Availability - Information Asset Availability indicates how soon the information is required, in case the same is lost. If critical information is unavailable to its end users, the organization’s mission may be affected. Following Table provides guideline to determine availability criteria of information assets. 9/16/2010 Saroj Availability Requirement Explanation Low There is minimal impact on business if the asset / information is not Available for up to 7 days Medium There is significant impact on business if the asset / information is not Available for up to 48 hours High The Asset / information is required on 24x7 basis
  • 49. Non-information Assets [Physical] Information is processed with the help of technology. The assets, which are helpful in creating, processing, output generation and storage. Such assets need to be identified and valued for the purpose of their criticality in business process. Asset valuation of non information / physical Assets like software, Hardware, Services is carried out based on different criteria applicable to the specific group of physical assets involved in organization’s business processes. 9/16/2010 Saroj
  • 50. Confidentiality - Non-information Asset Confidentiality factor is to be determined by the services rendered by the particular asset in specific business process and the confidentiality requirement of the information / data processed or stored by the asset. This table provides a guideline to identify the Confidentiality requirements and its link to Classification label. 9/16/2010 Saroj Confidentiality Requirement Explanation Low Information processed / stored / carried or services rendered by the asset in the business process have confidentiality requirements as LOW. Medium Information processed / stored / carried or services rendered by the asset in the business process have confidentiality requirements as Medium. High Information processed / stored / carried or services rendered by the asset in the business process have confidentiality requirements as HIGH.
  • 51. Integrity - Non Information Asset Integrity factor is to be determined by the reliability and dependability of the particular asset in specific business process and the Integrity requirement of the information / data processed or stored by the asset. This table provides a guideline to identify the Integrity requirements and its link to Classification label. 9/16/2010 Saroj Integrity Requirement Explanation Low Dependency and reliability of the services rendered by the particular asset in a business process is LOW. Information processed / stored / carried or services rendered by the asset in the business process have Integrity requirements as LOW. Medium Dependency and reliability of the services rendered by the particular asset in a business process is Medium. Information processed / stored / carried or services rendered by the asset in the business process have Integrity requirements as Medium. High Dependency and reliability of the services rendered by the particular asset in a business process is HIGH. Information processed / stored / carried or services rendered by the asset in the business process have Integrity requirements as High.
  • 52. Availability - Non-information Asset Availability factor is to be determined on the basis of impact of non availability of the asset on the business process. This table provides a guideline to identify the Availability requirements and its link to Classification label. 9/16/2010 Saroj Integrity Requirement Explanation Low Impact of non availability of an asset in a business process is LOW. Information processed / stored / carried or services rendered by the asset in the business process have Availability requirements as LOW. Medium Impact of non availability of an asset in a business process is Medium. Information processed / stored / carried or services rendered by the asset in the business process have Availability requirements as MEDIUM. High Impact of non availability of an asset in a business process is HIGH. Information processed / stored / carried or services rendered by the asset in the business process have Availability requirements as HIGH.
  • 53. People Assets Information is accessed or handled by the people from within the organization as well as the people related to organization for business requirements.   It becomes necessary to identify such people from within the organization as well as outside the organization who handle the organization’s information assets.   The analysis such people, who has access rights to the assets of the organization, is to be done by Business Process Owner i.e. process / function head. The people assets shall include roles handled by a. Employees b. Contract Employees c. Contractors & his employees 9/16/2010 Saroj
  • 54. Confidentiality - People Assets 9/16/2010 Saroj Confidentiality Requirement Explanation Low The role or third party identified has access limited to information assets classified as 'Public'. Security breach by individual/s whom the role is assigned would insignificantly affect the business operations. Medium The role or third party identified has access limited to information assets classified as 'Internal’ and 'Public'. Security breach by individual/s whom the role is assigned would moderately affect the business operations. High The role employee or third party identified has access to all types of information assets including information assets classified as 'Confidential' Or IT Assets classified as 'Critical'. Security breach by individual/s to whom the role is assigned would severely affect the business operations.
  • 55. Integrity – People Assets 9/16/2010 Saroj Integrity Requirement Explanation Low The role or third party identified has limited privilege to change information assets classified as 'Internal' or 'Public' and the his work is supervised. Security breach by individual/s to whom the role is assigned would insignificantly affect the business operations. Medium The role or third party identified has privilege to change information assets classified as 'Internal', and 'Public' Security breach by individual/s whom the role is assigned would moderately affect the business operations. High The role or third party identified has privilege to change information assets classified as 'Confidential' Or Change the configuration of IT assets classified as 'Critical' Security breach by individual/s to whom the role is assigned would severely affect the business operations.
  • 56. Availability – People Assets 9/16/2010 Saroj Availability Requirement Explanation Low Unavailability of the individual/s whom the role is assigned would have insignificant affect the business operations. Medium Unavailability of the individual/s whom the role is assigned would moderately affect the business operations. High Unavailability of the individual/s whom the role is assigned would severely affect the business operations.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. Human Wall Is Always Better Than A Firewall . . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL 9/16/2010 Saroj

Editor's Notes

  1. 10/19/11 Saroj
  2. 10/19/11 Saroj
  3. 10/19/11 Saroj
  4. 10/19/11 Saroj
  5. 10/19/11 Saroj
  6. 10/19/11 Saroj
  7. 10/19/11 Saroj
  8. 10/19/11 Saroj
  9. 10/19/11 Saroj
  10. 10/19/11 Saroj
  11. 10/19/11 Saroj
  12. 10/19/11 Saroj
  13. 10/19/11 Saroj
  14. 10/19/11 Saroj
  15. 10/19/11 Saroj
  16. 10/19/11 Saroj
  17. 10/19/11 Saroj
  18. 10/19/11 Saroj
  19. 10/19/11 Saroj
  20. 10/19/11 Saroj
  21. 10/19/11 Saroj
  22. 10/19/11 Saroj
  23. 10/19/11 Saroj
  24. 10/19/11 Saroj
  25. 10/19/11 Saroj
  26. 10/19/11 Saroj
  27. 10/19/11 Saroj
  28. 10/19/11 Saroj
  29. 10/19/11 Saroj
  30. 10/19/11 Saroj
  31. 10/19/11 Saroj
  32. 10/19/11 Saroj
  33. 10/19/11 Saroj
  34. 10/19/11 Saroj
  35. 10/19/11 Saroj
  36. 10/19/11 Saroj
  37. 10/19/11 Saroj
  38. 10/19/11 Saroj
  39. 10/19/11 Saroj
  40. 10/19/11 Saroj
  41. 10/19/11 Saroj
  42. 10/19/11 Saroj
  43. 10/19/11 Saroj
  44. 10/19/11 Saroj
  45. 10/19/11 Saroj
  46. 10/19/11 Saroj
  47. 10/19/11 Saroj
  48. 10/19/11 Saroj
  49. 10/19/11 Saroj
  50. 10/19/11 Saroj
  51. 10/19/11 Saroj
  52. 10/19/11 Saroj
  53. 10/19/11 Saroj
  54. 10/19/11 Saroj
  55. 10/19/11 Saroj
  56. 10/19/11 Saroj
  57. 10/19/11 Saroj
  58. 10/19/11 Saroj
  59. 10/19/11 Saroj
  60. 10/19/11 Saroj
  61. 10/19/11 Saroj
  62. 10/19/11 Saroj
  63. 10/19/11 Saroj