SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
 
	
  
©	
  2013	
  Neupart	
   	
   1	
  	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
How	
  the	
  ISO	
  27001	
  revision	
  
affects	
  your	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
risk	
  management	
  process	
  
	
  
	
  
By	
  Jakob	
  Holm	
  Hansen	
  
Head	
  of	
  Professional	
  Services	
  and	
  Product	
  Management	
  
at	
  Neupart	
  
ISO	
  
27001:2005	
  
ISO	
  
27001:2013	
  
 
	
  
©	
  2013	
  Neupart	
   	
   2	
  	
  
What	
  is	
  different	
  in	
  the	
  new	
  ISO	
  27001?	
  	
  
ISO	
  27001:2013	
  sets	
  the	
  stage	
  for	
  structural	
  changes	
  in	
  the	
  standards	
  individual	
  sections	
  and	
  
risk	
  management	
  gets	
  an	
  even	
  more	
  prominent	
  role.	
  
Plan-­‐Do-­‐Check-­‐Act	
  is	
  not	
  explicitly	
  mentioned	
  in	
  ISO	
  27001:2013,	
  but	
  that	
  doesn’t	
  mean	
  it	
  is	
  no	
  
longer	
  relevant.	
  The	
  standard	
  mentions	
  “continuous	
  improvement”	
  instead,	
  meaning	
  PDCA	
  is	
  
still	
  relevant	
  in	
  the	
  standard	
  although	
  less	
  
explicit	
  than	
  in	
  ISO	
  27001:2005.	
  	
  
It	
  is	
  now	
  called	
  “continuous	
  
improvement,”	
  and	
  is	
  very	
  much	
  at	
  the	
  
core	
  of	
  ISO	
  27001.	
  The	
  only	
  difference	
  is	
  
that	
  companies	
  are	
  now	
  free	
  to	
  choose	
  
the	
  way	
  they	
  guarantee	
  continual	
  
improvement,	
  be	
  it	
  by	
  PDCA	
  or	
  other	
  
types	
  of	
  processes.	
  
It	
  is	
  expected	
  that	
  there	
  will	
  either	
  be	
  a	
  
grace	
  period	
  where	
  certified	
  companies	
  
can	
  adapt	
  their	
  ISMS	
  and	
  make	
  sure	
  that	
  
they	
  meet	
  the	
  requirements	
  in	
  ISO	
  
27001:2013,	
  or	
  a	
  “grandfathering”	
  rule	
  
where	
  companies	
  are	
  required	
  to	
  switch	
  
as	
  their	
  certificates	
  expires.	
  
	
  
	
  
	
  
	
  
The	
  most	
  important	
  changes	
  in	
  ISO	
  27001:2013	
  are:	
  
New	
  structure	
  
With	
  the	
  2013	
  edition	
  of	
  ISO	
  27001,	
  the	
  most	
  obvious	
  change	
  is	
  in	
  the	
  structure.	
  ISO	
  
27001	
  is	
  now	
  aligned	
  with	
  Annex	
  SL	
  of	
  the	
  ISO	
  directives;	
  meaning	
  that	
  it’s	
  structure	
  is	
  
comparable	
  to	
  that	
  of	
  ISO	
  9001.	
  
In	
  my	
  opinion,	
  it’s	
  also	
  a	
  better	
  and	
  clearer	
  structure.	
  
	
  
Increased	
  flexibility	
  in	
  your	
  choice	
  of	
  risk	
  method	
  
In	
  the	
  old	
  ISO	
  27001	
  it	
  is	
  a	
  requirement	
  that	
  an	
  “asset	
  owner”	
  is	
  identified	
  and	
  that	
  a	
  
threat	
  based	
  vulnerability	
  assessment	
  is	
  implemented.	
  
	
  
The	
  rumours	
  of	
  Plan-­‐Do-­‐Check-­‐Act’s	
  
demise	
  has	
  been	
  greatly	
  exaggerated	
  
 
	
  
©	
  2013	
  Neupart	
   	
   3	
  	
  
In	
  the	
  new	
  version	
  “asset	
  owner”	
  is	
  renamed	
  
“risk	
   owner,”	
   and	
   you	
   are	
   only	
   required	
   to	
  
identify	
   risks	
   in	
   relation	
   to	
   confidentiality,	
  
integrity	
  and	
  availability.	
  	
  
	
  
This	
   is	
   likely	
   an	
   attempt	
   to	
   adapt	
   the	
   risk	
  
process	
  to	
  the	
  risk	
  management	
  standard	
  ISO	
  
31000.	
  
	
  
The	
  ISO	
  27005	
  standard	
  will	
  most	
  likely	
  still	
  be	
  
the	
  standard	
  used	
  as	
  starting	
  point	
  for	
  the	
  risk	
  
process	
  as	
  it	
  deals	
  specifically	
  with	
  IT	
  risks.	
  ISO	
  
31000	
   instead	
   provides	
   a	
   framework	
   for	
  
analysis	
  of	
  risk	
  types	
  in	
  businesses.	
  
	
  
Sharpened	
  demands	
  to	
  the	
  Information	
  Security	
  Management	
  System	
  context	
  
In	
  the	
  old	
  ISO	
  27001	
  the	
  section	
  on	
  establishing	
  the	
  ISMS	
  and	
  the	
  scope	
  is	
  brief	
  and	
  
unclear.	
  
	
  
In	
   the	
   new	
   version,	
   the	
   requirements	
   for	
   organisations	
   ISMS	
   context	
   have	
   been	
  
highlighted	
  with	
  the	
  requirement	
  that	
  all	
  relevant	
  external	
  shareholder	
  demands	
  must	
  
be	
  described	
  as	
  part	
  of	
  the	
  ISMS.	
  
	
  
Incidents	
  and	
  incident	
  handling	
  are	
  now	
  seen	
  in	
  a	
  broader	
  perspective	
  
A	
   new	
   section	
   called	
   “non-­‐conformity”	
   has	
   been	
   added	
   to	
   the	
   standard.	
   Non-­‐
conformity	
  covers	
  not	
  only	
  incidents	
  and	
  incident	
  handling,	
  but	
  also	
  all	
  other	
  kinds	
  of	
  
non-­‐conformity.	
  
	
  
Non-­‐conformities	
   are,	
   basically,	
   whatever	
   makes	
   you	
   deviate	
   from	
   the	
   ISMS	
   and	
   the	
  
controls	
  established	
  in	
  the	
  ISMS.	
  Besides	
  regular	
  security	
  incidents,	
  this	
  could	
  also	
  be	
  
findings	
   of	
   deviations	
   from	
   internal	
   audits,	
   as	
   well	
   as	
   gaps	
   in	
   the	
   specified	
   security	
  
levels.	
  
	
  
The	
  demands	
  for	
  monitoring	
  and	
  measuring	
  get	
  their	
  own	
  section	
  
In	
  the	
  new	
  ISO	
  27001,	
  the	
  requirements	
  for	
  surveillance	
  and	
  measurement	
  of	
  efficiency	
  
have	
  been	
  given	
  their	
  own	
  section.	
  
	
  
There	
   is	
   an	
   increased	
   focus	
   on	
   ensuring	
   that	
   companies	
   identify,	
   describe	
   and	
   can	
  
document	
  the	
  efficiency	
  of	
  the	
  implemented	
  IT	
  controls.	
  For	
  this	
  purpose	
  organisations	
  
must	
  draw	
  up	
  Key	
  Performance	
  Indicators	
  for	
  the	
  evaluation	
  of	
  all	
  implemented	
  security	
  
measures	
  and	
  be	
  able	
  to	
  document	
  the	
  KPI’s	
  output.	
  
	
  
Confidentiality	
  
Availability	
  Integrity	
  
As	
  opposed	
  to	
  the	
  old	
  one,	
  the	
  new	
  ISO	
  27001	
  is	
  now	
  focused	
  on	
  function	
  rather	
  than	
  form.	
  
 
	
  
©	
  2013	
  Neupart	
   	
   4	
  	
  
Ok,	
  so	
  how	
  does	
  that	
  affect	
  my	
  risk	
  management	
  process?	
  
If	
  you	
  don’t	
  have	
  a	
  risk	
  management	
  process,	
  you	
  need	
  to	
  get	
  cracking.	
  Because	
  a	
  sound	
  risk	
  
management	
  process	
  is	
  more	
  relevant	
  than	
  ever	
  in	
  ISO	
  27001:2013.	
  	
  
The	
  good	
  news	
  is	
  that	
  if	
  you	
  have	
  a	
  risk	
  management	
  process	
  compliant	
  with	
  the	
  2005	
  edition	
  
of	
  ISO	
  27001,	
  your	
  risk	
  management	
  process	
  will	
  most	
  likely	
  still	
  be	
  valid.	
  
This	
  is	
  because	
  the	
  new	
  standard	
  is	
  less	
  specific	
  on	
  the	
  risk	
  management	
  requirements.	
  
	
  
	
  
	
  
In	
  the	
  past	
  you	
  needed	
  a	
  risk	
  assessment	
  process	
  that	
  could:	
  
Identify	
  assets	
  
Identify	
  threats	
  to	
  assets	
  
Identify	
  vulnerabilities	
  that	
  might	
  be	
  exploited	
  by	
  the	
  threats	
  
Analyse	
  and	
  evaluate	
  risks	
  
And	
  a	
  risk	
  treatment	
  process	
  that	
  contained	
  the	
  following	
  specific	
  treatment	
  options:	
  
Reducing	
  the	
  risk	
  
Accepting	
  the	
  risk	
  
Avoiding	
  the	
  risk	
  
Sharing	
  the	
  risk	
  
This	
  incidentally	
  matches	
  the	
  way	
  ISO	
  27005	
  does	
  risk	
  management.	
  
While	
  this	
  way	
  of	
  doing	
  risk	
  management	
  is	
  still	
  best	
  practice	
  –	
  and	
  a	
  very	
  sustainable	
  process	
  –	
  
it	
  is	
  no	
  longer	
  a	
  requirement.	
  This	
  means	
  that	
  you	
  can	
  integrate	
  other	
  risk	
  standards	
  and	
  
practices	
  into	
  your	
  ISO	
  27001	
  programme	
  and	
  still	
  be	
  compliant.	
  
This	
  can	
  be	
  an	
  advantage	
  if	
  you	
  are	
  working	
  in	
  an	
  organisation	
  with	
  an	
  overall	
  Enterprise	
  Risk	
  
Management	
  (ERM)	
  programme	
  that	
  you	
  need	
  to	
  integrate	
  into.	
  
	
  
“Organisations	
  of	
  all	
  types	
  and	
  sizes	
  face	
  internal	
  and	
  external	
  factors	
  and	
  influences	
  that	
  make	
  it	
  
uncertain	
  whether	
  and	
  when	
  they	
  will	
  achieve	
  their	
  objectives.	
  The	
  effect	
  this	
  uncertainty	
  has	
  on	
  an	
  
organization's	
  objectives	
  is	
  “risk”	
  
-­‐ISO	
  31000	
  
Assets	
   Threats	
   Vulnerabilities	
  
Assess	
  and	
  
evaluate	
  
Risk	
  
treatment	
  
 
	
  
©	
  2013	
  Neupart	
   	
   5	
  	
  
Refreshingly,	
  ISO	
  27001:2013	
  also	
  
includes	
  “upside	
  risk,”	
  instead	
  of	
  
only	
  focusing	
  on	
  the	
  normal	
  
“downside	
  risk.”	
  As	
  a	
  part	
  of	
  your	
  
risk	
  management	
  process,	
  you	
  are	
  
now	
  also	
  required	
  to	
  identify	
  
opportunities,	
  and	
  make	
  sure	
  these	
  
are	
  realized.	
  
This	
  could	
  be	
  areas	
  in	
  your	
  ISMS	
  
where	
  you	
  have	
  identified	
  an	
  
opportunity	
  for	
  your	
  business,	
  by	
  
enabling	
  them	
  to	
  do	
  things	
  they	
  
weren’t	
  able	
  to	
  do	
  before,	
  or	
  deliver	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
new	
  and	
  improved	
  solutions.	
  
	
  
Risk	
  ownership	
  
Risk	
  ownership	
  is	
  a	
  new	
  concept	
  in	
  ISO	
  27001.	
  It	
  seems	
  like	
  an	
  offshoot	
  from	
  the	
  “asset	
  owner”	
  
in	
  the	
  old	
  ISO	
  27001.	
  
Risk	
  owners	
  has	
  been	
  introduced	
  for	
  two	
  reasons:	
  	
  
Firstly,	
  to	
  make	
  ISO	
  27001	
  more	
  flexible	
  
By	
  focusing	
  on	
  “risk	
  owners”	
  instead	
  of	
  “asset	
  owners,”	
  we	
  are	
  no	
  longer	
  bound	
  by	
  the	
  ISO	
  
27005	
  requirements	
  of	
  asset	
  ownership,	
  and	
  are	
  free	
  to	
  implement	
  any	
  risk	
  management	
  
process	
  that	
  fits	
  our	
  organisation.	
  
Secondly,	
  to	
  better	
  align	
  with	
  existing	
  ERM	
  processes	
  
Most	
  ERM	
  processes	
  aren’t	
  detailed	
  enough	
  to	
  focus	
  on	
  specific	
  assets,	
  but	
  rather	
  look	
  at	
  risk	
  
assessing	
  processes	
  or	
  scenarios.	
  If	
  we	
  wish	
  to	
  align	
  to	
  that	
  in	
  our	
  information	
  risk	
  
management,	
  then	
  that	
  is	
  possible.	
  
If	
  you	
  wish	
  to	
  continue	
  with	
  ISO	
  27005	
  and	
  best	
  practice	
  for	
  IT	
  risk	
  management,	
  the	
  new	
  risk	
  
ownership	
  concept	
  won’t	
  block	
  that.	
  Effectively,	
  an	
  asset	
  owner	
  in	
  this	
  scenario	
  will	
  be	
  a	
  risk	
  
owner	
  on	
  any	
  identified	
  risks	
  on	
  his	
  assets.	
  
	
  
	
  
Opportunities	
  
Realized	
  
business	
  
advantage	
  
A	
  risk	
  owner	
  approves	
  risk	
  treatment	
  plans	
  and	
  accepts	
  residual	
  risks	
  
 
	
  
©	
  2013	
  Neupart	
   	
   6	
  	
  
Risk	
  treatment	
  
Risk	
  treatment	
  is	
  an	
  integral	
  part	
  of	
  risk	
  management	
  and	
  the	
  ISO	
  27001	
  standard.	
  Basically,	
  risk	
  
treatment	
  is	
  the	
  practice	
  of	
  handling	
  and	
  treating	
  identified	
  and	
  evaluated	
  risks.	
  	
  
Risk	
  treatment	
  is	
  the	
  last	
  phase	
  of	
  your	
  risk	
  management	
  process.	
  After	
  you	
  have	
  evaluated,	
  
assessed	
  and	
  analysed	
  your	
  risks	
  
Like	
  mentioned	
  above,	
  risk	
  treatment	
  is	
  traditionally	
  done	
  by	
  reducing,	
  accepting,	
  avoiding	
  or	
  
sharing	
  the	
  risk.	
  
The	
  primary	
  purpose	
  of	
  risk	
  treatment	
  is	
  to	
  integrate	
  with	
  and	
  define	
  the	
  Statement	
  of	
  
Applicability	
  in	
  your	
  organisations	
  ISMS.	
  	
  
The	
  Statement	
  of	
  Applicability	
  defines	
  the	
  scope	
  of	
  controls,	
  in	
  Annex	
  A,	
  which	
  the	
  
organisation	
  wants	
  to	
  implement.	
  This	
  is	
  why	
  risk	
  management	
  is	
  essential	
  in	
  ISO	
  27001,	
  it	
  is	
  the	
  
instrument	
  we	
  use	
  to	
  define	
  our	
  SoA	
  and	
  thereby	
  our	
  controls.	
  
In	
  ISO	
  27001:2013,	
  a	
  risk	
  treatment	
  plan	
  is	
  the	
  tool	
  used	
  to	
  create	
  a	
  SoA.	
  
	
  
	
  
Risk	
  treatment	
  	
  
plan	
  
SoA	
  
Control	
   Control	
  
High	
  
High	
  
High	
  
Annex	
  A	
  
Risks	
  
 
	
  
©	
  2013	
  Neupart	
   	
   7	
  	
  
Conclusion	
  
While	
  there	
  are	
  many	
  similarities	
  between	
  ISO	
  27001:2005	
  and	
  ISO	
  27001:2013,	
  there	
  are	
  still	
  
some	
  differences.	
  
In	
  practice,	
  you	
  can	
  keep	
  your	
  current	
  risk	
  process,	
  and	
  stay	
  compliant	
  with	
  some	
  minor	
  
additions	
  or	
  clarifications:	
  
Define	
  risk	
  ownership	
  in	
  the	
  context	
  of	
  your	
  organisation	
  and	
  process	
  
Demonstrate	
  a	
  clear	
  link	
  between	
  risk	
  treatment	
  and	
  your	
  Statement	
  of	
  Applicability	
  
Even	
  though	
  you	
  can	
  continue	
  with	
  your	
  existing	
  risk	
  process,	
  do	
  try	
  to	
  optimize	
  now	
  that	
  you	
  
have	
  the	
  increased	
  flexibility.	
  
So,	
  when	
  changing	
  to	
  ISO	
  27001:2013,	
  our	
  recommendation	
  would	
  be	
  to	
  evaluate	
  your	
  risk	
  
process.	
  You	
  could	
  have	
  several	
  reasons	
  for	
  this:	
  
Maybe	
  you	
  want	
  to	
  integrate	
  better	
  into	
  your	
  company	
  ERM	
  
Your	
  industry	
  uses	
  a	
  different	
  risk	
  process	
  (OCTAVE,	
  NIST,	
  ISO	
  31000,	
  etc.)	
  
You	
  want	
  to	
  take	
  better	
  advantage	
  of	
  risk	
  opportunities	
  	
  
	
  
	
  
The	
  ISO	
  27001	
  standard	
  is	
  currently	
  being	
  revised	
  and	
  is	
  expected	
  to	
  be	
  final	
  in	
  October	
  2013.	
  
This	
  document	
  is	
  based	
  upon	
  the	
  “final	
  draft,”	
  but	
  it’s	
  highly	
  unlikely	
  that	
  any	
  major	
  changes	
  
are	
  going	
  to	
  occur	
  at	
  this	
  stage.	
  So	
  this	
  document	
  won’t	
  be	
  out-­‐dated	
  once	
  the	
  final	
  release	
  
lands.
 
	
  
©	
  2013	
  Neupart	
   	
   8	
  	
  
What	
  is	
  SecureAware	
  IT	
  GRC?	
  
Spend	
  less	
  time	
  on	
  security	
  management	
  and	
  get	
  a	
  more	
  precise	
  overview	
  of	
  your	
  security.	
  If	
  you	
  have	
  
to	
  comply	
  with	
  standards	
  or	
  best	
  practice	
  for	
  information	
  security,	
  SecureAware	
  gives	
  you	
  improved	
  
efficiency	
  and	
  the	
  option	
  to	
  easily	
  assess	
  how	
  much	
  security	
  your	
  organisation	
  needs.	
  
With	
  SecureAware	
  you	
  no	
  longer	
  need	
  complex	
  spread	
  sheets	
  for	
  risk	
  assessments,	
  and	
  you	
  can	
  avoid	
  
using	
  lengthy	
  security	
  manuals	
  in	
  countless	
  versions.	
  Further,	
  SecureAware	
  gives	
  you	
  several	
  shortcuts	
  
to	
  ISO	
  27001,	
  PCI	
  DSS-­‐compliance	
  and	
  others.	
  You	
  will	
  also	
  get	
  a	
  complete	
  overview	
  of	
  your	
  recurring	
  
security	
  tasks.	
  That	
  way	
  you	
  can	
  spend	
  less	
  time	
  on	
  security	
  management,	
  or	
  you	
  can	
  choose	
  to	
  spend	
  
your	
  consultancy	
  budget	
  on	
  other	
  projects.	
  
SecureAware	
  can	
  be	
  used	
  as	
  a	
  full	
  IT	
  GRC	
  solution	
  or	
  as	
  individual	
  modules.	
  
Get	
  more	
  information	
  and	
  a	
  free	
  trial	
  here:	
  	
  	
  www.neupart.com/products	
  	
  
Using	
  SecureAware	
  you	
  will	
  get:	
  
• ISO	
  27001	
  Information	
  Security	
  
Management	
  System	
  (ISMS)	
  
• Plan-­‐Do-­‐Check-­‐Act	
  process	
  and	
  
Statement	
  of	
  Applicability	
  
• IT	
  risk	
  management	
  in	
  compliance	
  
with	
  ISO	
  27005	
  and	
  NIST	
  SP800-­‐37	
  
• PCI	
  DSS	
  compliance	
  
• Policy	
  and	
  security	
  awareness	
  
management	
  
• Cloud	
  vendor	
  analysis	
  based	
  on	
  
Cloud	
  Security	
  Alliance	
  GRC	
  Stack	
  
• Compliance	
  analysis	
  
• Control	
  of	
  the	
  security	
  functions	
  
• Business	
  Continuity	
  Planning	
  in	
  
accordance	
  with	
  BS	
  25999	
  
• Timesaving	
  templates	
  for	
  security	
  
policies,	
  business	
  continuity	
  plans	
  
and	
  threat	
  catalogue	
  
• APIs	
  for	
  data	
  exchange	
  
• Smart	
  upgrade	
  ensures	
  easy	
  access	
  
to	
  new	
  features	
  and	
  content	
  
updates	
  
• Runs	
  on	
  several	
  SQL	
  databases	
  
• MS	
  Active	
  Directory	
  support	
  with	
  
users	
  and	
  groups	
  
• Available	
  as	
  a	
  software	
  solution	
  or	
  
as	
  a	
  service	
  
	
  
 
	
  
©	
  2013	
  Neupart	
   	
   9	
  	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
Neupart,	
  an	
  ISO	
  27001	
  certified	
  company,	
  provides	
  an	
  all-­‐in-­‐one,	
  efficient	
  IT	
  GRC	
  solution	
  
allowing	
  organizations	
  to	
  automate	
  IT	
  governance,	
  risk	
  and	
  compliance	
  management.	
  
Whether	
  you	
  need	
  to	
  manage	
  evolving	
  business	
  risks	
  or	
  achieve	
  continuous	
  compliance	
  
with	
  PCI	
  DSS,	
  ISO	
  27001,	
  EU	
  Data	
  Protection	
  Regulations,	
  Cloud	
  Security	
  Alliance	
  Control	
  
Matrix,	
  or	
  WLA	
  SCS,	
  Neupart	
  allows	
  you	
  to	
  respond	
  effectively	
  -­‐	
  in	
  the	
  cloud	
  or	
  on	
  the	
  
ground.	
  More	
  than	
  200	
  organizations	
  worldwide	
  are	
  Neupart	
  customers,	
  including	
  
governments,	
  utilities,	
  banks	
  and	
  insurance	
  firms,	
  IT	
  service	
  providers	
  and	
  lotteries.	
  
	
  
Neupart	
  A/S	
  	
  
Hollandsvej	
  12	
  
DK-­‐2800	
  Lyngby	
  
T:	
  +45	
  7025	
  8030	
  
www.neupart.com	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Goutama Bachtiar
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassA-lign
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 

Was ist angesagt? (20)

Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access Pass
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
ISO 27001:2013 - A transition guide
ISO 27001:2013 - A transition guideISO 27001:2013 - A transition guide
ISO 27001:2013 - A transition guide
 

Andere mochten auch

PECB Webinar: Enterprise Risk Management with ISO 27001 perspective
PECB Webinar: Enterprise Risk Management with ISO 27001 perspectivePECB Webinar: Enterprise Risk Management with ISO 27001 perspective
PECB Webinar: Enterprise Risk Management with ISO 27001 perspectivePECB
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyPECB
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001PECB
 
ISO Annex SL Clause 4: Context of the Organisation
ISO Annex SL Clause 4: Context of the OrganisationISO Annex SL Clause 4: Context of the Organisation
ISO Annex SL Clause 4: Context of the OrganisationRobert Clements
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014DQS Inc.
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Risk mangement
Risk mangementRisk mangement
Risk mangementcollege
 

Andere mochten auch (16)

PECB Webinar: Enterprise Risk Management with ISO 27001 perspective
PECB Webinar: Enterprise Risk Management with ISO 27001 perspectivePECB Webinar: Enterprise Risk Management with ISO 27001 perspective
PECB Webinar: Enterprise Risk Management with ISO 27001 perspective
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
ISO Annex SL Clause 4: Context of the Organisation
ISO Annex SL Clause 4: Context of the OrganisationISO Annex SL Clause 4: Context of the Organisation
ISO Annex SL Clause 4: Context of the Organisation
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Risk mangement
Risk mangementRisk mangement
Risk mangement
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Ähnlich wie How the the 2013 update of ISO 27001 Impacts your Risk Management

UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014DQS India
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NA Putra
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças Fernando Palma
 
ISO 27001 Certification in indiamain .ppt
ISO 27001 Certification in indiamain  .pptISO 27001 Certification in indiamain  .ppt
ISO 27001 Certification in indiamain .pptHardinScott8
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lankaAnoosha Factocert
 
Introduction to International Organization for Standardization
Introduction to International Organization for StandardizationIntroduction to International Organization for Standardization
Introduction to International Organization for StandardizationSami Ullah
 
ISO 27001 certification cost in Bangalore.ppt
ISO 27001 certification cost in Bangalore.pptISO 27001 certification cost in Bangalore.ppt
ISO 27001 certification cost in Bangalore.pptHardinScott8
 
Iso 27001 certification in oman
Iso 27001 certification in omanIso 27001 certification in oman
Iso 27001 certification in omanKumudaFactocert
 
certificacion ISO 27001 bogota (Spain).ppt
certificacion ISO 27001 bogota (Spain).pptcertificacion ISO 27001 bogota (Spain).ppt
certificacion ISO 27001 bogota (Spain).pptkeithhansen21
 
Business Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An OverviewBusiness Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An OverviewAhmed Riad .
 
Quality management system services 'QMS' in India
Quality management system services 'QMS' in IndiaQuality management system services 'QMS' in India
Quality management system services 'QMS' in IndiaManojHosur
 

Ähnlich wie How the the 2013 update of ISO 27001 Impacts your Risk Management (20)

UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças
 
ISO 27001 Certification in indiamain .ppt
ISO 27001 Certification in indiamain  .pptISO 27001 Certification in indiamain  .ppt
ISO 27001 Certification in indiamain .ppt
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka
 
Iso 22301
Iso 22301Iso 22301
Iso 22301
 
Introduction to International Organization for Standardization
Introduction to International Organization for StandardizationIntroduction to International Organization for Standardization
Introduction to International Organization for Standardization
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
ISO 27001 certification cost in Bangalore.ppt
ISO 27001 certification cost in Bangalore.pptISO 27001 certification cost in Bangalore.ppt
ISO 27001 certification cost in Bangalore.ppt
 
Iso 27001 certification in oman
Iso 27001 certification in omanIso 27001 certification in oman
Iso 27001 certification in oman
 
certificacion ISO 27001 bogota (Spain).ppt
certificacion ISO 27001 bogota (Spain).pptcertificacion ISO 27001 bogota (Spain).ppt
certificacion ISO 27001 bogota (Spain).ppt
 
Business Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An OverviewBusiness Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An Overview
 
Iso 27001 isms
Iso 27001 ismsIso 27001 isms
Iso 27001 isms
 
Quality management system services 'QMS' in India
Quality management system services 'QMS' in IndiaQuality management system services 'QMS' in India
Quality management system services 'QMS' in India
 

Mehr von Lars Neupart

Neupart webinar 1: Four shortcuts to better risk assessments
Neupart webinar 1: Four shortcuts to better risk assessmentsNeupart webinar 1: Four shortcuts to better risk assessments
Neupart webinar 1: Four shortcuts to better risk assessmentsLars Neupart
 
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22Lars Neupart
 
Til ledelsen it-sikkerhed for forretningen
Til ledelsen   it-sikkerhed for forretningen Til ledelsen   it-sikkerhed for forretningen
Til ledelsen it-sikkerhed for forretningen Lars Neupart
 
Dansk It Neupart Cloud Sikkerhed Risikovurdering
Dansk It Neupart Cloud Sikkerhed RisikovurderingDansk It Neupart Cloud Sikkerhed Risikovurdering
Dansk It Neupart Cloud Sikkerhed RisikovurderingLars Neupart
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012Lars Neupart
 
Muligheder for sikker cloud computing
Muligheder for sikker cloud computingMuligheder for sikker cloud computing
Muligheder for sikker cloud computingLars Neupart
 
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?Tror du stadig du kan sige nej tak til Web 2.0 og skyen?
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?Lars Neupart
 

Mehr von Lars Neupart (7)

Neupart webinar 1: Four shortcuts to better risk assessments
Neupart webinar 1: Four shortcuts to better risk assessmentsNeupart webinar 1: Four shortcuts to better risk assessments
Neupart webinar 1: Four shortcuts to better risk assessments
 
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
 
Til ledelsen it-sikkerhed for forretningen
Til ledelsen   it-sikkerhed for forretningen Til ledelsen   it-sikkerhed for forretningen
Til ledelsen it-sikkerhed for forretningen
 
Dansk It Neupart Cloud Sikkerhed Risikovurdering
Dansk It Neupart Cloud Sikkerhed RisikovurderingDansk It Neupart Cloud Sikkerhed Risikovurdering
Dansk It Neupart Cloud Sikkerhed Risikovurdering
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012
 
Muligheder for sikker cloud computing
Muligheder for sikker cloud computingMuligheder for sikker cloud computing
Muligheder for sikker cloud computing
 
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?Tror du stadig du kan sige nej tak til Web 2.0 og skyen?
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?
 

Kürzlich hochgeladen

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Kürzlich hochgeladen (20)

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

How the the 2013 update of ISO 27001 Impacts your Risk Management

  • 1.     ©  2013  Neupart     1                       How  the  ISO  27001  revision   affects  your                                                         risk  management  process       By  Jakob  Holm  Hansen   Head  of  Professional  Services  and  Product  Management   at  Neupart   ISO   27001:2005   ISO   27001:2013  
  • 2.     ©  2013  Neupart     2     What  is  different  in  the  new  ISO  27001?     ISO  27001:2013  sets  the  stage  for  structural  changes  in  the  standards  individual  sections  and   risk  management  gets  an  even  more  prominent  role.   Plan-­‐Do-­‐Check-­‐Act  is  not  explicitly  mentioned  in  ISO  27001:2013,  but  that  doesn’t  mean  it  is  no   longer  relevant.  The  standard  mentions  “continuous  improvement”  instead,  meaning  PDCA  is   still  relevant  in  the  standard  although  less   explicit  than  in  ISO  27001:2005.     It  is  now  called  “continuous   improvement,”  and  is  very  much  at  the   core  of  ISO  27001.  The  only  difference  is   that  companies  are  now  free  to  choose   the  way  they  guarantee  continual   improvement,  be  it  by  PDCA  or  other   types  of  processes.   It  is  expected  that  there  will  either  be  a   grace  period  where  certified  companies   can  adapt  their  ISMS  and  make  sure  that   they  meet  the  requirements  in  ISO   27001:2013,  or  a  “grandfathering”  rule   where  companies  are  required  to  switch   as  their  certificates  expires.           The  most  important  changes  in  ISO  27001:2013  are:   New  structure   With  the  2013  edition  of  ISO  27001,  the  most  obvious  change  is  in  the  structure.  ISO   27001  is  now  aligned  with  Annex  SL  of  the  ISO  directives;  meaning  that  it’s  structure  is   comparable  to  that  of  ISO  9001.   In  my  opinion,  it’s  also  a  better  and  clearer  structure.     Increased  flexibility  in  your  choice  of  risk  method   In  the  old  ISO  27001  it  is  a  requirement  that  an  “asset  owner”  is  identified  and  that  a   threat  based  vulnerability  assessment  is  implemented.     The  rumours  of  Plan-­‐Do-­‐Check-­‐Act’s   demise  has  been  greatly  exaggerated  
  • 3.     ©  2013  Neupart     3     In  the  new  version  “asset  owner”  is  renamed   “risk   owner,”   and   you   are   only   required   to   identify   risks   in   relation   to   confidentiality,   integrity  and  availability.       This   is   likely   an   attempt   to   adapt   the   risk   process  to  the  risk  management  standard  ISO   31000.     The  ISO  27005  standard  will  most  likely  still  be   the  standard  used  as  starting  point  for  the  risk   process  as  it  deals  specifically  with  IT  risks.  ISO   31000   instead   provides   a   framework   for   analysis  of  risk  types  in  businesses.     Sharpened  demands  to  the  Information  Security  Management  System  context   In  the  old  ISO  27001  the  section  on  establishing  the  ISMS  and  the  scope  is  brief  and   unclear.     In   the   new   version,   the   requirements   for   organisations   ISMS   context   have   been   highlighted  with  the  requirement  that  all  relevant  external  shareholder  demands  must   be  described  as  part  of  the  ISMS.     Incidents  and  incident  handling  are  now  seen  in  a  broader  perspective   A   new   section   called   “non-­‐conformity”   has   been   added   to   the   standard.   Non-­‐ conformity  covers  not  only  incidents  and  incident  handling,  but  also  all  other  kinds  of   non-­‐conformity.     Non-­‐conformities   are,   basically,   whatever   makes   you   deviate   from   the   ISMS   and   the   controls  established  in  the  ISMS.  Besides  regular  security  incidents,  this  could  also  be   findings   of   deviations   from   internal   audits,   as   well   as   gaps   in   the   specified   security   levels.     The  demands  for  monitoring  and  measuring  get  their  own  section   In  the  new  ISO  27001,  the  requirements  for  surveillance  and  measurement  of  efficiency   have  been  given  their  own  section.     There   is   an   increased   focus   on   ensuring   that   companies   identify,   describe   and   can   document  the  efficiency  of  the  implemented  IT  controls.  For  this  purpose  organisations   must  draw  up  Key  Performance  Indicators  for  the  evaluation  of  all  implemented  security   measures  and  be  able  to  document  the  KPI’s  output.     Confidentiality   Availability  Integrity   As  opposed  to  the  old  one,  the  new  ISO  27001  is  now  focused  on  function  rather  than  form.  
  • 4.     ©  2013  Neupart     4     Ok,  so  how  does  that  affect  my  risk  management  process?   If  you  don’t  have  a  risk  management  process,  you  need  to  get  cracking.  Because  a  sound  risk   management  process  is  more  relevant  than  ever  in  ISO  27001:2013.     The  good  news  is  that  if  you  have  a  risk  management  process  compliant  with  the  2005  edition   of  ISO  27001,  your  risk  management  process  will  most  likely  still  be  valid.   This  is  because  the  new  standard  is  less  specific  on  the  risk  management  requirements.         In  the  past  you  needed  a  risk  assessment  process  that  could:   Identify  assets   Identify  threats  to  assets   Identify  vulnerabilities  that  might  be  exploited  by  the  threats   Analyse  and  evaluate  risks   And  a  risk  treatment  process  that  contained  the  following  specific  treatment  options:   Reducing  the  risk   Accepting  the  risk   Avoiding  the  risk   Sharing  the  risk   This  incidentally  matches  the  way  ISO  27005  does  risk  management.   While  this  way  of  doing  risk  management  is  still  best  practice  –  and  a  very  sustainable  process  –   it  is  no  longer  a  requirement.  This  means  that  you  can  integrate  other  risk  standards  and   practices  into  your  ISO  27001  programme  and  still  be  compliant.   This  can  be  an  advantage  if  you  are  working  in  an  organisation  with  an  overall  Enterprise  Risk   Management  (ERM)  programme  that  you  need  to  integrate  into.     “Organisations  of  all  types  and  sizes  face  internal  and  external  factors  and  influences  that  make  it   uncertain  whether  and  when  they  will  achieve  their  objectives.  The  effect  this  uncertainty  has  on  an   organization's  objectives  is  “risk”   -­‐ISO  31000   Assets   Threats   Vulnerabilities   Assess  and   evaluate   Risk   treatment  
  • 5.     ©  2013  Neupart     5     Refreshingly,  ISO  27001:2013  also   includes  “upside  risk,”  instead  of   only  focusing  on  the  normal   “downside  risk.”  As  a  part  of  your   risk  management  process,  you  are   now  also  required  to  identify   opportunities,  and  make  sure  these   are  realized.   This  could  be  areas  in  your  ISMS   where  you  have  identified  an   opportunity  for  your  business,  by   enabling  them  to  do  things  they   weren’t  able  to  do  before,  or  deliver                                                                                                                                                                                                                       new  and  improved  solutions.     Risk  ownership   Risk  ownership  is  a  new  concept  in  ISO  27001.  It  seems  like  an  offshoot  from  the  “asset  owner”   in  the  old  ISO  27001.   Risk  owners  has  been  introduced  for  two  reasons:     Firstly,  to  make  ISO  27001  more  flexible   By  focusing  on  “risk  owners”  instead  of  “asset  owners,”  we  are  no  longer  bound  by  the  ISO   27005  requirements  of  asset  ownership,  and  are  free  to  implement  any  risk  management   process  that  fits  our  organisation.   Secondly,  to  better  align  with  existing  ERM  processes   Most  ERM  processes  aren’t  detailed  enough  to  focus  on  specific  assets,  but  rather  look  at  risk   assessing  processes  or  scenarios.  If  we  wish  to  align  to  that  in  our  information  risk   management,  then  that  is  possible.   If  you  wish  to  continue  with  ISO  27005  and  best  practice  for  IT  risk  management,  the  new  risk   ownership  concept  won’t  block  that.  Effectively,  an  asset  owner  in  this  scenario  will  be  a  risk   owner  on  any  identified  risks  on  his  assets.       Opportunities   Realized   business   advantage   A  risk  owner  approves  risk  treatment  plans  and  accepts  residual  risks  
  • 6.     ©  2013  Neupart     6     Risk  treatment   Risk  treatment  is  an  integral  part  of  risk  management  and  the  ISO  27001  standard.  Basically,  risk   treatment  is  the  practice  of  handling  and  treating  identified  and  evaluated  risks.     Risk  treatment  is  the  last  phase  of  your  risk  management  process.  After  you  have  evaluated,   assessed  and  analysed  your  risks   Like  mentioned  above,  risk  treatment  is  traditionally  done  by  reducing,  accepting,  avoiding  or   sharing  the  risk.   The  primary  purpose  of  risk  treatment  is  to  integrate  with  and  define  the  Statement  of   Applicability  in  your  organisations  ISMS.     The  Statement  of  Applicability  defines  the  scope  of  controls,  in  Annex  A,  which  the   organisation  wants  to  implement.  This  is  why  risk  management  is  essential  in  ISO  27001,  it  is  the   instrument  we  use  to  define  our  SoA  and  thereby  our  controls.   In  ISO  27001:2013,  a  risk  treatment  plan  is  the  tool  used  to  create  a  SoA.       Risk  treatment     plan   SoA   Control   Control   High   High   High   Annex  A   Risks  
  • 7.     ©  2013  Neupart     7     Conclusion   While  there  are  many  similarities  between  ISO  27001:2005  and  ISO  27001:2013,  there  are  still   some  differences.   In  practice,  you  can  keep  your  current  risk  process,  and  stay  compliant  with  some  minor   additions  or  clarifications:   Define  risk  ownership  in  the  context  of  your  organisation  and  process   Demonstrate  a  clear  link  between  risk  treatment  and  your  Statement  of  Applicability   Even  though  you  can  continue  with  your  existing  risk  process,  do  try  to  optimize  now  that  you   have  the  increased  flexibility.   So,  when  changing  to  ISO  27001:2013,  our  recommendation  would  be  to  evaluate  your  risk   process.  You  could  have  several  reasons  for  this:   Maybe  you  want  to  integrate  better  into  your  company  ERM   Your  industry  uses  a  different  risk  process  (OCTAVE,  NIST,  ISO  31000,  etc.)   You  want  to  take  better  advantage  of  risk  opportunities         The  ISO  27001  standard  is  currently  being  revised  and  is  expected  to  be  final  in  October  2013.   This  document  is  based  upon  the  “final  draft,”  but  it’s  highly  unlikely  that  any  major  changes   are  going  to  occur  at  this  stage.  So  this  document  won’t  be  out-­‐dated  once  the  final  release   lands.
  • 8.     ©  2013  Neupart     8     What  is  SecureAware  IT  GRC?   Spend  less  time  on  security  management  and  get  a  more  precise  overview  of  your  security.  If  you  have   to  comply  with  standards  or  best  practice  for  information  security,  SecureAware  gives  you  improved   efficiency  and  the  option  to  easily  assess  how  much  security  your  organisation  needs.   With  SecureAware  you  no  longer  need  complex  spread  sheets  for  risk  assessments,  and  you  can  avoid   using  lengthy  security  manuals  in  countless  versions.  Further,  SecureAware  gives  you  several  shortcuts   to  ISO  27001,  PCI  DSS-­‐compliance  and  others.  You  will  also  get  a  complete  overview  of  your  recurring   security  tasks.  That  way  you  can  spend  less  time  on  security  management,  or  you  can  choose  to  spend   your  consultancy  budget  on  other  projects.   SecureAware  can  be  used  as  a  full  IT  GRC  solution  or  as  individual  modules.   Get  more  information  and  a  free  trial  here:      www.neupart.com/products     Using  SecureAware  you  will  get:   • ISO  27001  Information  Security   Management  System  (ISMS)   • Plan-­‐Do-­‐Check-­‐Act  process  and   Statement  of  Applicability   • IT  risk  management  in  compliance   with  ISO  27005  and  NIST  SP800-­‐37   • PCI  DSS  compliance   • Policy  and  security  awareness   management   • Cloud  vendor  analysis  based  on   Cloud  Security  Alliance  GRC  Stack   • Compliance  analysis   • Control  of  the  security  functions   • Business  Continuity  Planning  in   accordance  with  BS  25999   • Timesaving  templates  for  security   policies,  business  continuity  plans   and  threat  catalogue   • APIs  for  data  exchange   • Smart  upgrade  ensures  easy  access   to  new  features  and  content   updates   • Runs  on  several  SQL  databases   • MS  Active  Directory  support  with   users  and  groups   • Available  as  a  software  solution  or   as  a  service    
  • 9.     ©  2013  Neupart     9                                                 Neupart,  an  ISO  27001  certified  company,  provides  an  all-­‐in-­‐one,  efficient  IT  GRC  solution   allowing  organizations  to  automate  IT  governance,  risk  and  compliance  management.   Whether  you  need  to  manage  evolving  business  risks  or  achieve  continuous  compliance   with  PCI  DSS,  ISO  27001,  EU  Data  Protection  Regulations,  Cloud  Security  Alliance  Control   Matrix,  or  WLA  SCS,  Neupart  allows  you  to  respond  effectively  -­‐  in  the  cloud  or  on  the   ground.  More  than  200  organizations  worldwide  are  Neupart  customers,  including   governments,  utilities,  banks  and  insurance  firms,  IT  service  providers  and  lotteries.     Neupart  A/S     Hollandsvej  12   DK-­‐2800  Lyngby   T:  +45  7025  8030   www.neupart.com