SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Michael Brophy
ISO 27001 Trends and   CEO
       Developments    Certification Europe




                                              1
2
1000
                        2000
                               3000
                                       4000
                                              5000
                                                     6000
                                                            7000
                                                                   8000




                                                                                                                  Global take-up of ISO 27001
             0
    Apr-99
    Jan-02
    Jan-04




                                                                          Total No. of ISO 27001 Certifications
    Dec-04
    Nov-05
    Jan-06
    Oct-06
    Jan-07
    Feb-07
    Mar-07
    Apr-07
    Aug-07
    Oct-07
    Dec-07
    Aug-08
    Dec-08
    Sep-09
    Nov-09
    Dec-09
    Dec-11
                               Total
3
Top Ten Countries with ISO 27001
                  Certificates
4500
4000
3500
3000
2500
2000
1500
1000
500
  0




                                   4
Which sectors are prominent?
                IT & IT Services (Security)

                    Financial Services

           Government & Semi-State (extensive)

                        Telecoms

                         Printing

                        Software

                       Consultancy

                       Healthcare

               Online Gambling & Betting *

                     Infrastructure *

                                                 5
Why are organisations getting
certified?


   • First mover advantage still a factor, but not in the
     ten major categories
   • Tendering requirements
   • Supply chain pressure
   • In some sectors it is virtually a market requirement
     (E.g. hosting and datacentres)




                                                            6
Why are organisations getting
certified?
  What Standards or Guidelines have your customers required
  you to comply with?


                                                                                  41%
       A recognised standard like ISO 27001
                                                                              31%
                                                                                        Large Organisations
                                                                            37%         Small Organisations
            Government related requirements
                                                                      26%


                                                                             30%
                   PCI (payment Card Industry)
                                                                    16%


                                                               6%
                                                 Other
                                                               6%


                                                                              32%
              Not aware of any such demands
                                                                                  38%




Source: PWC Information Security Breaches Survey 2010 fig 15                                                  7
8
Recent Trends (1)


  • High Profile Data Breaches




                                 9
Recent Trends (1)


  • High Profile Data Breaches




                                 10
Recent Trends (2)

     • Supply Chain Pressure



Security Policy Guidelines (Telefónica O2 UK only)
O2 attaches particular importance to the security of its own, its
employees’ and its customers’ data.
The reference standard for O2’s security policies is ISO27001 and the
suppliers shall comply with the principles of that standard at all times.




                                                                            11
Recent Trends (3)

  • Major incidents




                      12
Recent Trends (3)

  • Major incidents




                      13
Recent Trends (3)

   • Major incidents


Office of the Australian Information Commissioner:
“noted that the company had a wide range of security
safeguards in place for the protection of personal
information including physical, network,
communications security and maintained security
standards… ISO 27001”


                                                   14
15
What is coming down the line (1)


     • Expect to see ISO 27001 (& BS 25999)
       featuring in many more tendering
       requirements
     • Particularly when IT services are
       outsourced




                                              16
What is coming down the line (2)



     • ISO 27001 used as a basis to address
       the risks associated with Cloud
       Computing




                                              17
What is coming down the line (3)



     • Increasing reliance being placed upon
       ISO 27001 by regulatory bodies




                                               18
What is coming down the line (3)




         • APACS & Standard 55




                                   19
What is coming down the line (3)
       • "Outsourcing requires not only a
         written contract but also active
         measures to ensure data is secure in
         the “cloud”. If a cloud provider has
         taken the trouble to certify to
         recognised security standards such as
         ISO 27001… this provides significant
         reassurance about data security."


Irish Data Protection Commissioner Annual Report 2010



                                                        20
What is coming down the line (3)


     • Financial Services Authority (UK)
     • "FSA Handbook" in SYSC 3A.7.8 that
       "firms should have regard to
       established security standards such as
       ISO17799 (Information Security
       Management)."




                                                21
What is coming down the line (3)




     • In essence evolving to become a key
       tool in overall risk management as
       opposed to an isolated activity




                                             22
Thank you



      mbrophy@certificationeurope.com



   www.certificationeurope.com



                                        23

Weitere ähnliche Inhalte

Was ist angesagt?

ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowPECB
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesCertification Europe
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information SecurityAna Meskovska
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001Iris Maaß
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001qualitysummit
 

Was ist angesagt? (20)

ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
 

Ähnlich wie ISO 27001 Information Security Management Systems Trends and Developments

Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Teguh Prasetya
 
201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT FrameworksFrancisco Calzado
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdfControlCase
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyControlCase
 
Negotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementNegotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementEduardo Mendez Polo
 
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014Matthieu DEMOOR
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
 
I Forum GSTI - David Bathiely
I Forum GSTI - David BathielyI Forum GSTI - David Bathiely
I Forum GSTI - David BathielyMarcos Andre
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?PECB
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysisperk2624
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Citigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing ConferenceCitigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing Conferencefinance10
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...AMD Developer Central
 
SU Student Investment Fund - Fall 2010
SU Student Investment Fund - Fall 2010SU Student Investment Fund - Fall 2010
SU Student Investment Fund - Fall 2010fb18077
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper Networks
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
Cyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdfCyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdftoncik
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Hitachi Data Systems France
 

Ähnlich wie ISO 27001 Information Security Management Systems Trends and Developments (20)

Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Ai Investor Presentation July 2007
Ai Investor Presentation July 2007
 
201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 
Negotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementNegotiating the Next Service Level Agreement
Negotiating the Next Service Level Agreement
 
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 
GRC2-KSA.ppt
GRC2-KSA.pptGRC2-KSA.ppt
GRC2-KSA.ppt
 
I Forum GSTI - David Bathiely
I Forum GSTI - David BathielyI Forum GSTI - David Bathiely
I Forum GSTI - David Bathiely
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysis
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Citigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing ConferenceCitigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing Conference
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
SU Student Investment Fund - Fall 2010
SU Student Investment Fund - Fall 2010SU Student Investment Fund - Fall 2010
SU Student Investment Fund - Fall 2010
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press Conference
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
Cyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdfCyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdf
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

ISO 27001 Information Security Management Systems Trends and Developments

  • 1. Michael Brophy ISO 27001 Trends and CEO Developments Certification Europe 1
  • 2. 2
  • 3. 1000 2000 3000 4000 5000 6000 7000 8000 Global take-up of ISO 27001 0 Apr-99 Jan-02 Jan-04 Total No. of ISO 27001 Certifications Dec-04 Nov-05 Jan-06 Oct-06 Jan-07 Feb-07 Mar-07 Apr-07 Aug-07 Oct-07 Dec-07 Aug-08 Dec-08 Sep-09 Nov-09 Dec-09 Dec-11 Total 3
  • 4. Top Ten Countries with ISO 27001 Certificates 4500 4000 3500 3000 2500 2000 1500 1000 500 0 4
  • 5. Which sectors are prominent? IT & IT Services (Security) Financial Services Government & Semi-State (extensive) Telecoms Printing Software Consultancy Healthcare Online Gambling & Betting * Infrastructure * 5
  • 6. Why are organisations getting certified? • First mover advantage still a factor, but not in the ten major categories • Tendering requirements • Supply chain pressure • In some sectors it is virtually a market requirement (E.g. hosting and datacentres) 6
  • 7. Why are organisations getting certified? What Standards or Guidelines have your customers required you to comply with? 41% A recognised standard like ISO 27001 31% Large Organisations 37% Small Organisations Government related requirements 26% 30% PCI (payment Card Industry) 16% 6% Other 6% 32% Not aware of any such demands 38% Source: PWC Information Security Breaches Survey 2010 fig 15 7
  • 8. 8
  • 9. Recent Trends (1) • High Profile Data Breaches 9
  • 10. Recent Trends (1) • High Profile Data Breaches 10
  • 11. Recent Trends (2) • Supply Chain Pressure Security Policy Guidelines (Telefónica O2 UK only) O2 attaches particular importance to the security of its own, its employees’ and its customers’ data. The reference standard for O2’s security policies is ISO27001 and the suppliers shall comply with the principles of that standard at all times. 11
  • 12. Recent Trends (3) • Major incidents 12
  • 13. Recent Trends (3) • Major incidents 13
  • 14. Recent Trends (3) • Major incidents Office of the Australian Information Commissioner: “noted that the company had a wide range of security safeguards in place for the protection of personal information including physical, network, communications security and maintained security standards… ISO 27001” 14
  • 15. 15
  • 16. What is coming down the line (1) • Expect to see ISO 27001 (& BS 25999) featuring in many more tendering requirements • Particularly when IT services are outsourced 16
  • 17. What is coming down the line (2) • ISO 27001 used as a basis to address the risks associated with Cloud Computing 17
  • 18. What is coming down the line (3) • Increasing reliance being placed upon ISO 27001 by regulatory bodies 18
  • 19. What is coming down the line (3) • APACS & Standard 55 19
  • 20. What is coming down the line (3) • "Outsourcing requires not only a written contract but also active measures to ensure data is secure in the “cloud”. If a cloud provider has taken the trouble to certify to recognised security standards such as ISO 27001… this provides significant reassurance about data security." Irish Data Protection Commissioner Annual Report 2010 20
  • 21. What is coming down the line (3) • Financial Services Authority (UK) • "FSA Handbook" in SYSC 3A.7.8 that "firms should have regard to established security standards such as ISO17799 (Information Security Management)." 21
  • 22. What is coming down the line (3) • In essence evolving to become a key tool in overall risk management as opposed to an isolated activity 22
  • 23. Thank you mbrophy@certificationeurope.com www.certificationeurope.com 23