SlideShare ist ein Scribd-Unternehmen logo
1 von 46
ADDRESSING CORPORATE CONCERNS  ON  INFORMATION SECURITY MANAGEMENT  WITH  ISO 17799/ BS 7799. Ajai K. Srivastava G.M. Marketing  BSI India
[object Object],[object Object],[object Object],[object Object],[object Object],Presentation Outline
1.THE GLOBAL INFORMATION VILLAGE
The Global Information Village
The Paradigm Shift in the Nature of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE DIGITAL NERVOUS SYSTEM DIGITAL NERVOUS SYSTEM Strategic Thinking Business Reflexes Basic Operations Customer Interaction BUSINESS @ THE SPEED OF THOUGHT
INFORMATION FLOW IS THE LIFEBLOOD  OF YOUR BUSINESS
[object Object],[object Object],IMAGE
“ Information is an  asset  which, like other important business assets, has  value  to an organization and consequently needs to be  suitably protected .” ISO/IEC 17799:2000
2.THE NEED FOR PROTECTION
INFORMATION INFORMATION Information Security TECHNOLOGY  ENVIRONMENT  ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK
Typical Technology Responses
Information Security HUMAN  FIREWALL  HUMAN  FIREWALL  INFORMATION TECHNOLOGY  ENVIRONMENT  INFORMATION ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK POLICIES  PROCESSES  STANDARDS  TRAINING
Information Security POLICIES  PROCESSES  STANDARDS  TRAINING HUMAN  FIREWALL  HUMAN  FIREWALL  INFORMATION TECHNOLOGY  ENVIRONMENT  INFORMATION ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK
Information Security MANAGEMENT  MANAGEMENT  POLICIES  PROCESSES  STANDARDS  TRAINING HUMAN  FIREWALL  HUMAN  FIREWALL  INFORMATION TECHNOLOGY  ENVIRONMENT  INFORMATION
Management System – Building Blocks Core Processes Inputs Support Processes Management Resource Outputs Total  Business Management  System
Business Management System Quality Environment Health and  Safety Risk Information  Security People Improvement
Business Management System BSI - IMS Risk BSI Risk Mgmt H & S OHSAS 18001 Improvement ISO 9004 Customers BS 8600 Info Sec BS 7799 Environment ISO 14001 Quality ISO9001:2000 QS-9000 / TS 16949 AS9000 / AS9100 TL9000
ISO 9004 Performance Improvement  All Interested Parties ISO 17799 Information Security Management OHSAS 18001 Health and Safety Management ISO 14001 Environmental Management ISO 9001 Quality Management Stakeholders Involved   Increasing Aspects Covered Management Systems & Standards
Managing your Risks
Information Security Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Virtuous  M S Spiral  Commitment and Policy Planning Implementation and Operation Checking and Corrective Action Management Review Continual Improvement
Information Security Management  must be  viewed as a strategic dimension of your  business ,[object Object],[object Object],[object Object],[object Object],ISMS – Your Competitive Edge
The First Global Information Security Survey –KPMG 2002 Critical Security Concerns VIRUSES –22% HACKERS – 21% R.A.CONTROLS-17% INTERNET SECURITY-17% DATA PRIVACY- 10 %
What is the damage The First Global Information Security Survey – KPMG 2002 QUANTIFIABLE The average direct loss of all  breaches suffered by  each organization is USD$108,000.  GBP 30,000 INR 500,000
What is the damage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INCALCULABLE
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Common Myths About Information Security
3.BS 7799 – AN OVERVIEW
What is Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISO/IEC 17799:2000
ISO/IEC 17799 ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does it comprise ? ,[object Object],[object Object]
BS 7799-2:2002 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Act ,[object Object],[object Object],[object Object],[object Object],[object Object],Check ,[object Object],[object Object],[object Object],[object Object],[object Object],Do Plan
BS 7799 –10 Domains of Information Management System Development Access Controls Asset  Classification Controls Information  Security Policy Security  Organisation Personnel Security Physical Security Continuity Planning Compliance INFORMATION Staff Records Client Records Financial Records Communications Management
4.IMPLEMENTING AN ISMS BASED ON BS 7799
BS 7799Registrations  Around the Globe
BS 7799Registrations  In India
Measure/Analyse Progress Building a Management System INPUT Client Business Awareness OUTPUT BSI Certification Business Improvement Develop Management System Build Process BSI Consultant Client
Initiating BS 7799 Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Assessment and  Risk  Management Process
BS 7799  Implementation Security  Organisation Classify Assets Information  Security Policy Apply the  Controls Operationalise Process Check Process Corrective Action Management Review  Plan Act Check Do
ISMS Documentation Procedure Work Instructions, checklists,  forms, etc. Records ,[object Object],Policy, scope risk assessment, statement of applicability Describes processes – who, what, when, where Describes how tasks and specific activities are done Provides objective evidence of compliance to  ISMS requirements Management framework policies relating to BS 7799-2 Level 2 Level 3 Level 4 Level 1
Critical Success Factors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5.BENEFITS OF BS 7799
[object Object],[object Object],[object Object],[object Object],Benefits of BS 7799 certification
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key Challenges facing executives
Further Information Email:   ajai . srivastava @ bsiindia .com Tel:  +11 2371 9002/3 Fax:  +11 2373 9003

Weitere ähnliche Inhalte

Was ist angesagt?

ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
Key pillars for effective risk management
Key pillars for effective risk managementKey pillars for effective risk management
Key pillars for effective risk managementRamana K V
 
Introduction to Information System Security
Introduction  to Information System SecurityIntroduction  to Information System Security
Introduction to Information System Securitychauhankapil
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsCertification Europe
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information SecurityAna Meskovska
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)Rois Solihin
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 

Was ist angesagt? (20)

ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Isms
IsmsIsms
Isms
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
Key pillars for effective risk management
Key pillars for effective risk managementKey pillars for effective risk management
Key pillars for effective risk management
 
Introduction to Information System Security
Introduction  to Information System SecurityIntroduction  to Information System Security
Introduction to Information System Security
 
Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how
 
information security management
information security managementinformation security management
information security management
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and Developments
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
 
Iso 27001 10_apr_2006
Iso 27001 10_apr_2006Iso 27001 10_apr_2006
Iso 27001 10_apr_2006
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
ISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 TopologyISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 Topology
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 

Andere mochten auch

Evolución Digital de las Marcas
Evolución Digital de las MarcasEvolución Digital de las Marcas
Evolución Digital de las MarcasTmedia Solutions
 
Newsletter Banca IFIS Group 2
Newsletter Banca IFIS Group 2Newsletter Banca IFIS Group 2
Newsletter Banca IFIS Group 2Banca Ifis
 
Detector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_c
Detector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_cDetector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_c
Detector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_cYoily Gonzalez
 
Un concurso en la selva
Un concurso en la selvaUn concurso en la selva
Un concurso en la selvaescnorsup
 
Projektmanagement-Zertifizierungen: Was passt zu wem?
Projektmanagement-Zertifizierungen: Was passt zu wem?Projektmanagement-Zertifizierungen: Was passt zu wem?
Projektmanagement-Zertifizierungen: Was passt zu wem?Digicomp Academy AG
 
Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...
Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...
Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...Cheryl Stephens
 
Palmieri - Red Mundial de Comunicación Organizacional: Ciberprotestas
Palmieri  - Red Mundial de Comunicación Organizacional: CiberprotestasPalmieri  - Red Mundial de Comunicación Organizacional: Ciberprotestas
Palmieri - Red Mundial de Comunicación Organizacional: CiberprotestasRicardo Palmieri
 
Digital Era
Digital  EraDigital  Era
Digital Eramauroto
 
Harmonic drive general catalog
Harmonic drive general catalogHarmonic drive general catalog
Harmonic drive general catalogElectromate
 
Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...
Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...
Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...Pilar Torres
 
Waste Management and Recycling in Dar es Salaam, Tanzania_Josh Palfreman
Waste Management and Recycling in Dar es Salaam, Tanzania_Josh PalfremanWaste Management and Recycling in Dar es Salaam, Tanzania_Josh Palfreman
Waste Management and Recycling in Dar es Salaam, Tanzania_Josh PalfremanJoshua Palfreman
 
AYUDA VIRTUAL PARA LA SOCILIZACION
AYUDA  VIRTUAL PARA LA SOCILIZACIONAYUDA  VIRTUAL PARA LA SOCILIZACION
AYUDA VIRTUAL PARA LA SOCILIZACIONguesteca319e4
 

Andere mochten auch (20)

Corazones solidarios
Corazones solidariosCorazones solidarios
Corazones solidarios
 
Evolución Digital de las Marcas
Evolución Digital de las MarcasEvolución Digital de las Marcas
Evolución Digital de las Marcas
 
Newsletter Banca IFIS Group 2
Newsletter Banca IFIS Group 2Newsletter Banca IFIS Group 2
Newsletter Banca IFIS Group 2
 
Los objetivos del catalogo
Los objetivos del catalogoLos objetivos del catalogo
Los objetivos del catalogo
 
Detector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_c
Detector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_cDetector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_c
Detector inteligente de_gas_combustible_de_tipo_catalítico_-_modelo_s4000_c
 
Un concurso en la selva
Un concurso en la selvaUn concurso en la selva
Un concurso en la selva
 
Projektmanagement-Zertifizierungen: Was passt zu wem?
Projektmanagement-Zertifizierungen: Was passt zu wem?Projektmanagement-Zertifizierungen: Was passt zu wem?
Projektmanagement-Zertifizierungen: Was passt zu wem?
 
Cuestionario de redes convergentes
Cuestionario de redes convergentesCuestionario de redes convergentes
Cuestionario de redes convergentes
 
Trabajo libre
Trabajo libreTrabajo libre
Trabajo libre
 
Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...
Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...
Hochhauser: How Do Our Readers Really Think, Understand, and Decide-- Despite...
 
Palmieri - Red Mundial de Comunicación Organizacional: Ciberprotestas
Palmieri  - Red Mundial de Comunicación Organizacional: CiberprotestasPalmieri  - Red Mundial de Comunicación Organizacional: Ciberprotestas
Palmieri - Red Mundial de Comunicación Organizacional: Ciberprotestas
 
Digital Era
Digital  EraDigital  Era
Digital Era
 
Capability statement
Capability statementCapability statement
Capability statement
 
Harmonic drive general catalog
Harmonic drive general catalogHarmonic drive general catalog
Harmonic drive general catalog
 
OA in the ERA and Horizon 2020
OA in the ERA and Horizon 2020OA in the ERA and Horizon 2020
OA in the ERA and Horizon 2020
 
Marketing industrial transportes barreto
Marketing industrial  transportes barretoMarketing industrial  transportes barreto
Marketing industrial transportes barreto
 
REBT ITC-BT-01: Terminología
REBT ITC-BT-01: TerminologíaREBT ITC-BT-01: Terminología
REBT ITC-BT-01: Terminología
 
Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...
Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...
Ana Medrano 1º Y 2º Eso PresentacióN Y AnáLisis De Las Secuencias DidáCticas ...
 
Waste Management and Recycling in Dar es Salaam, Tanzania_Josh Palfreman
Waste Management and Recycling in Dar es Salaam, Tanzania_Josh PalfremanWaste Management and Recycling in Dar es Salaam, Tanzania_Josh Palfreman
Waste Management and Recycling in Dar es Salaam, Tanzania_Josh Palfreman
 
AYUDA VIRTUAL PARA LA SOCILIZACION
AYUDA  VIRTUAL PARA LA SOCILIZACIONAYUDA  VIRTUAL PARA LA SOCILIZACION
AYUDA VIRTUAL PARA LA SOCILIZACION
 

Ähnlich wie ADDRESSING CORPORATE CONCERNS

Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)samsontamwaiho
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)samsontamwaiho
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need LR_Yanus
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 

Ähnlich wie ADDRESSING CORPORATE CONCERNS (20)

Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Isms info
Isms infoIsms info
Isms info
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 

Mehr von zohaibqadir

Technology Entrepreneurship (Assign No 2)
Technology Entrepreneurship (Assign No 2)Technology Entrepreneurship (Assign No 2)
Technology Entrepreneurship (Assign No 2)zohaibqadir
 
Technology Entrepreneurship (assig no 2)
Technology Entrepreneurship (assig no 2)Technology Entrepreneurship (assig no 2)
Technology Entrepreneurship (assig no 2)zohaibqadir
 
175 PMP Sample Questions
175 PMP Sample Questions175 PMP Sample Questions
175 PMP Sample Questionszohaibqadir
 
Project Management Institute
Project Management InstituteProject Management Institute
Project Management Institutezohaibqadir
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priorityzohaibqadir
 

Mehr von zohaibqadir (6)

Technology Entrepreneurship (Assign No 2)
Technology Entrepreneurship (Assign No 2)Technology Entrepreneurship (Assign No 2)
Technology Entrepreneurship (Assign No 2)
 
Technology Entrepreneurship (assig no 2)
Technology Entrepreneurship (assig no 2)Technology Entrepreneurship (assig no 2)
Technology Entrepreneurship (assig no 2)
 
175 PMP Sample Questions
175 PMP Sample Questions175 PMP Sample Questions
175 PMP Sample Questions
 
PgM ITTOs
PgM ITTOsPgM ITTOs
PgM ITTOs
 
Project Management Institute
Project Management InstituteProject Management Institute
Project Management Institute
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
 

ADDRESSING CORPORATE CONCERNS

  • 1. ADDRESSING CORPORATE CONCERNS ON INFORMATION SECURITY MANAGEMENT WITH ISO 17799/ BS 7799. Ajai K. Srivastava G.M. Marketing BSI India
  • 2.
  • 5.
  • 6. THE DIGITAL NERVOUS SYSTEM DIGITAL NERVOUS SYSTEM Strategic Thinking Business Reflexes Basic Operations Customer Interaction BUSINESS @ THE SPEED OF THOUGHT
  • 7. INFORMATION FLOW IS THE LIFEBLOOD OF YOUR BUSINESS
  • 8.
  • 9. “ Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected .” ISO/IEC 17799:2000
  • 10. 2.THE NEED FOR PROTECTION
  • 11. INFORMATION INFORMATION Information Security TECHNOLOGY ENVIRONMENT ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK
  • 13. Information Security HUMAN FIREWALL HUMAN FIREWALL INFORMATION TECHNOLOGY ENVIRONMENT INFORMATION ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK POLICIES PROCESSES STANDARDS TRAINING
  • 14. Information Security POLICIES PROCESSES STANDARDS TRAINING HUMAN FIREWALL HUMAN FIREWALL INFORMATION TECHNOLOGY ENVIRONMENT INFORMATION ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK ATTACK
  • 15. Information Security MANAGEMENT MANAGEMENT POLICIES PROCESSES STANDARDS TRAINING HUMAN FIREWALL HUMAN FIREWALL INFORMATION TECHNOLOGY ENVIRONMENT INFORMATION
  • 16. Management System – Building Blocks Core Processes Inputs Support Processes Management Resource Outputs Total Business Management System
  • 17. Business Management System Quality Environment Health and Safety Risk Information Security People Improvement
  • 18. Business Management System BSI - IMS Risk BSI Risk Mgmt H & S OHSAS 18001 Improvement ISO 9004 Customers BS 8600 Info Sec BS 7799 Environment ISO 14001 Quality ISO9001:2000 QS-9000 / TS 16949 AS9000 / AS9100 TL9000
  • 19. ISO 9004 Performance Improvement All Interested Parties ISO 17799 Information Security Management OHSAS 18001 Health and Safety Management ISO 14001 Environmental Management ISO 9001 Quality Management Stakeholders Involved Increasing Aspects Covered Management Systems & Standards
  • 21.
  • 22. The Virtuous M S Spiral Commitment and Policy Planning Implementation and Operation Checking and Corrective Action Management Review Continual Improvement
  • 23.
  • 24. The First Global Information Security Survey –KPMG 2002 Critical Security Concerns VIRUSES –22% HACKERS – 21% R.A.CONTROLS-17% INTERNET SECURITY-17% DATA PRIVACY- 10 %
  • 25. What is the damage The First Global Information Security Survey – KPMG 2002 QUANTIFIABLE The average direct loss of all breaches suffered by each organization is USD$108,000. GBP 30,000 INR 500,000
  • 26.
  • 27.
  • 28. 3.BS 7799 – AN OVERVIEW
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. BS 7799 –10 Domains of Information Management System Development Access Controls Asset Classification Controls Information Security Policy Security Organisation Personnel Security Physical Security Continuity Planning Compliance INFORMATION Staff Records Client Records Financial Records Communications Management
  • 34. 4.IMPLEMENTING AN ISMS BASED ON BS 7799
  • 35. BS 7799Registrations Around the Globe
  • 37. Measure/Analyse Progress Building a Management System INPUT Client Business Awareness OUTPUT BSI Certification Business Improvement Develop Management System Build Process BSI Consultant Client
  • 38.
  • 39. Risk Assessment and Risk Management Process
  • 40. BS 7799 Implementation Security Organisation Classify Assets Information Security Policy Apply the Controls Operationalise Process Check Process Corrective Action Management Review Plan Act Check Do
  • 41.
  • 42.
  • 44.
  • 45.
  • 46. Further Information Email: ajai . srivastava @ bsiindia .com Tel: +11 2371 9002/3 Fax: +11 2373 9003

Hinweis der Redaktion

  1. Introduction slide Presentation will cover: WHY you need an Information Security System WHAT the 7799 series gives you HOW BSI can further assist you
  2. Introduction slide Presentation will cover: WHY you need an Information Security System WHAT the 7799 series gives you HOW BSI can further assist you
  3. Some of the businesses that did better in the wake of the WTC disaster, were able to re-host their business operations almost immediately using Business Continuance solutions. These solutions automatically relocated their data center operations in the minutes immediately following the loss of the data centers. This minimized the impact of the failure for businesses that had implemented these solutions, allowing them to quickly return to normal operations, and then to take the time that they needed to re-establish and recover their original data centers while the businesses continued to operate. These types of solutions can take advantage of redundant infrastructure that a business may have available, in other sites and locations or at partner sites. Many businesses had also outsourced this service from service providers that included IBM, Comdisco, and Sunguard.
  4. Intended for use as a reference document. Provides a comprehensive set of security controls. The best information security practices in use. It comprises of 10 control sections.
  5. Remember: - only first document is ISO and it is at least three years away before second document becomes ISO - 7 countries voted against ISO but majority rule carried the document through, (USA, Canada, France, Germany),
  6. It is necessary for the management system to be effective in the organization. If the company has taken a standard of the shelf package it is not a good start. This would be quiet easily identified by the auditor. Then is the company serious about the subject matter, or are they just paying lip service to information security.