SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Steps to implement ISO
27001:2013 with effectiveness
Firstly get some knowledge about the importance of the
ISO. Several companies around the world are looking for
business reasons in order to getting the due value from the
customers because of the certification process.
The certification can be an adding value in your business,
so you can be aligned with good practices and continuous
improvement process.
The ISO 27001 also can help your company to be aligned
with the national and international regulators and it’s
mandatory for some kind of businesses.
There are many reasons to adopt ISO 27001
In Europe, you also need to get attention with GDPR –
General Data Protection Regulation, Cyber essentials and
have preparing some Awareness program.
Both are very important and in some cases mandatory to
be your company compliance with Information Security,
Governance and Regulators, covering 99% of your best
practices and mandatory stuffs of GRC and Cyber Security
threats.
Regulator details
An appropriated support from the top management is
mandatory to starting to working throught a successful
implementation of the ISO 27001:2013
Get an appropriate support from the management
Step 1
Choose very carefully an appropriated process not so big,
and not so small, but interesting over the business point
view.
In this fase is very important consider the environment,
geographically and do not forget the regulators and laws
suitable to your business.
Define a scopeChoosing the process and scope
Step 2
The information security police is one of the most
important document that one company must be in place
for any type of implementation. This will be the guidance
for the employees working aligned with the best practices
and legal, also to working with 3rd parties.
The information security police should be the “hat” about
what they can do or not !
Note: Have in mind to be in place baselines, procedures
and other standards too.
Write the security policy
Step 3
Understanding about your business assets, the cyber
threats, vulnerabilities and possible impacts is essential on
this fase. When define your assets, connect them with the
“risk owners” too.
Remember your risk methodology can be “quantitative” or
“qualitative”. You also can perform gusing some market
methodology (IRAM, OCTAVE, Cobit5) or just used ISO
31000, 27005…
Choosing the risk assessment methodology
Step 4
So choose a very good risk methodology and calculate your
risk factor.
E.g. Case you choose the “quantitative” mode, your risk
assessment can be easly defined (low, medium or high).
The risk assessment need to define the criteria to (Accept,
Tranfer, Avoid or Tranfer the risk).
Some people prefer to invest in softwares to perform the
risk assessments, others like to use excel. It is up to your
business and budget.
Perform proper the risk assessment
Step 5
The SOA (Statement of Applicatibility) is a key document for
an ISMS. Some companies wrote the SOA based on Gap
analysis.
The SOA should have:
•
Objective controls already selected must be applied
•
The risk assessment results associated with CIA
(Confidentiality, Integrity and Availability).
•
Legal obligations
•
Review by the organisation owners
Prepare the SOA
Step 6
The organisation should prepare a formal document
regarding the Risk Treatment Plan (RTP) aligned with
“security police” and define the approach of the risk
treatment plan.
On this fase you should identify:
•
The necessary controls to apply and exclude (Based on
risk assessment choose method)
Prepare an appropriated RTP
Step 7
Now we have to use the appropriated controls listed on
SOA in your organisation.
Prepare the necessary controls
Step 8
An effective and simple security awareness program,
aligned with the incident management process can be a
good start to encourage your employees as well as align
with your company's business strategy.
Many organizations in Europe have defined good
methodologies and processes already proven and
functional for various types of organizations. ENISA has a
series of documentation on this, but consider consulting
your national regulator and laws (E.G. FCA, ICO, etc ...)
Implement an awareness program
Step 9
So important as creating a safety and awareness program
for your company, it will also know how to measure KPIs as
well as measure and apply the controls needed to correct
the various issues that arise along the way.
Monitor the effectiveness of the program
Step 10
Have in mind that on the new ISO version 2013 the PDCA is
not longer required, so you don’t have to use the PDCA
model.
So, is very important monitor yours ISMS (Information
security management systems) properly.
Operate and monitor the ISMS
Step 11
In order to try your strategy and improve, you can adopt
several national models suggested as penetration test or
even cyber essentials and perform constant (Each 6 months
or quarterly), as well as audits that reinforce your risk
management strategy aligned with your company's
business strategy.
Perform an internal audit and checks
Step 12
As you may know, your management should be the media
sponsor for your ISO 27001 safety program. In this way,
ensure that your ISMS is aligned with the company's
objectives and has sufficient focus to ensure the controls
Required internally or by your regulator.
Submit to management review
Step 13
Using the appropriate support and based on your risk
management plan, appropriately apply corrective and
preventive actions, as well as try to align your strategy with
cyber security standards (NIST, Cobit, etc ...)
Apply corrective and preventive actions
Step 14
Ralf Sermatheu
ralfbraga@gmail.com
Thank you !

Weitere ähnliche Inhalte

Was ist angesagt?

ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingOperational Excellence Consulting
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfSerkanRafetHalil1
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdfControlCase
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 

Was ist angesagt? (20)

ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 

Ähnlich wie Steps to iso 27001 implementation

ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationIrmaBrkic1
 
What are the steps for ISO 13485 certification
What are the steps for ISO 13485 certificationWhat are the steps for ISO 13485 certification
What are the steps for ISO 13485 certificationhimalya sharma
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
What are the steps for ISO 14001 Certification
What are the steps for ISO 14001 CertificationWhat are the steps for ISO 14001 Certification
What are the steps for ISO 14001 Certificationhimalya sharma
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NA Putra
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
 
What are the steps for ISO 50001 Certification
What are the steps for ISO 50001 CertificationWhat are the steps for ISO 50001 Certification
What are the steps for ISO 50001 Certificationhimalya sharma
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lankaAnoosha Factocert
 
ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxNapoleon NV
 
What are the steps for ISO 9001 Certification
What are the steps for ISO 9001 CertificationWhat are the steps for ISO 9001 Certification
What are the steps for ISO 9001 Certificationhimalya sharma
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramTammy Clark
 
How to get iso 14001 certification in zambia
How to get iso 14001 certification in zambiaHow to get iso 14001 certification in zambia
How to get iso 14001 certification in zambiaAnoosha Factocert
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
 
A Vision On Integrated Inspection Planning Prototyping
A Vision On Integrated Inspection Planning PrototypingA Vision On Integrated Inspection Planning Prototyping
A Vision On Integrated Inspection Planning PrototypingGH_Wijnants
 

Ähnlich wie Steps to iso 27001 implementation (20)

ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
What are the steps for ISO 13485 certification
What are the steps for ISO 13485 certificationWhat are the steps for ISO 13485 certification
What are the steps for ISO 13485 certification
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
Process
ProcessProcess
Process
 
What are the steps for ISO 14001 Certification
What are the steps for ISO 14001 CertificationWhat are the steps for ISO 14001 Certification
What are the steps for ISO 14001 Certification
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
What are the steps for ISO 50001 Certification
What are the steps for ISO 50001 CertificationWhat are the steps for ISO 50001 Certification
What are the steps for ISO 50001 Certification
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka
 
ISO27000_27001.pptx
ISO27000_27001.pptxISO27000_27001.pptx
ISO27000_27001.pptx
 
ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptx
 
What are the steps for ISO 9001 Certification
What are the steps for ISO 9001 CertificationWhat are the steps for ISO 9001 Certification
What are the steps for ISO 9001 Certification
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
How to get iso 14001 certification in zambia
How to get iso 14001 certification in zambiaHow to get iso 14001 certification in zambia
How to get iso 14001 certification in zambia
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
 
A Vision On Integrated Inspection Planning Prototyping
A Vision On Integrated Inspection Planning PrototypingA Vision On Integrated Inspection Planning Prototyping
A Vision On Integrated Inspection Planning Prototyping
 

Kürzlich hochgeladen

George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 

Kürzlich hochgeladen (20)

George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 

Steps to iso 27001 implementation

  • 1. Steps to implement ISO 27001:2013 with effectiveness
  • 2. Firstly get some knowledge about the importance of the ISO. Several companies around the world are looking for business reasons in order to getting the due value from the customers because of the certification process. The certification can be an adding value in your business, so you can be aligned with good practices and continuous improvement process. The ISO 27001 also can help your company to be aligned with the national and international regulators and it’s mandatory for some kind of businesses. There are many reasons to adopt ISO 27001
  • 3. In Europe, you also need to get attention with GDPR – General Data Protection Regulation, Cyber essentials and have preparing some Awareness program. Both are very important and in some cases mandatory to be your company compliance with Information Security, Governance and Regulators, covering 99% of your best practices and mandatory stuffs of GRC and Cyber Security threats. Regulator details
  • 4. An appropriated support from the top management is mandatory to starting to working throught a successful implementation of the ISO 27001:2013 Get an appropriate support from the management Step 1
  • 5. Choose very carefully an appropriated process not so big, and not so small, but interesting over the business point view. In this fase is very important consider the environment, geographically and do not forget the regulators and laws suitable to your business. Define a scopeChoosing the process and scope Step 2
  • 6. The information security police is one of the most important document that one company must be in place for any type of implementation. This will be the guidance for the employees working aligned with the best practices and legal, also to working with 3rd parties. The information security police should be the “hat” about what they can do or not ! Note: Have in mind to be in place baselines, procedures and other standards too. Write the security policy Step 3
  • 7. Understanding about your business assets, the cyber threats, vulnerabilities and possible impacts is essential on this fase. When define your assets, connect them with the “risk owners” too. Remember your risk methodology can be “quantitative” or “qualitative”. You also can perform gusing some market methodology (IRAM, OCTAVE, Cobit5) or just used ISO 31000, 27005… Choosing the risk assessment methodology Step 4
  • 8. So choose a very good risk methodology and calculate your risk factor. E.g. Case you choose the “quantitative” mode, your risk assessment can be easly defined (low, medium or high). The risk assessment need to define the criteria to (Accept, Tranfer, Avoid or Tranfer the risk). Some people prefer to invest in softwares to perform the risk assessments, others like to use excel. It is up to your business and budget. Perform proper the risk assessment Step 5
  • 9. The SOA (Statement of Applicatibility) is a key document for an ISMS. Some companies wrote the SOA based on Gap analysis. The SOA should have: • Objective controls already selected must be applied • The risk assessment results associated with CIA (Confidentiality, Integrity and Availability). • Legal obligations • Review by the organisation owners Prepare the SOA Step 6
  • 10. The organisation should prepare a formal document regarding the Risk Treatment Plan (RTP) aligned with “security police” and define the approach of the risk treatment plan. On this fase you should identify: • The necessary controls to apply and exclude (Based on risk assessment choose method) Prepare an appropriated RTP Step 7
  • 11. Now we have to use the appropriated controls listed on SOA in your organisation. Prepare the necessary controls Step 8
  • 12. An effective and simple security awareness program, aligned with the incident management process can be a good start to encourage your employees as well as align with your company's business strategy. Many organizations in Europe have defined good methodologies and processes already proven and functional for various types of organizations. ENISA has a series of documentation on this, but consider consulting your national regulator and laws (E.G. FCA, ICO, etc ...) Implement an awareness program Step 9
  • 13. So important as creating a safety and awareness program for your company, it will also know how to measure KPIs as well as measure and apply the controls needed to correct the various issues that arise along the way. Monitor the effectiveness of the program Step 10
  • 14. Have in mind that on the new ISO version 2013 the PDCA is not longer required, so you don’t have to use the PDCA model. So, is very important monitor yours ISMS (Information security management systems) properly. Operate and monitor the ISMS Step 11
  • 15. In order to try your strategy and improve, you can adopt several national models suggested as penetration test or even cyber essentials and perform constant (Each 6 months or quarterly), as well as audits that reinforce your risk management strategy aligned with your company's business strategy. Perform an internal audit and checks Step 12
  • 16. As you may know, your management should be the media sponsor for your ISO 27001 safety program. In this way, ensure that your ISMS is aligned with the company's objectives and has sufficient focus to ensure the controls Required internally or by your regulator. Submit to management review Step 13
  • 17. Using the appropriate support and based on your risk management plan, appropriately apply corrective and preventive actions, as well as try to align your strategy with cyber security standards (NIST, Cobit, etc ...) Apply corrective and preventive actions Step 14