SlideShare a Scribd company logo
1 of 4
Download to read offline
Techserv


     ISO 27001


Executive Brief




                                       ISO 27001
                                   IT / IS SECURITY


                                Our Approach
                  Ownership . Practical . Effective




                                   “Promoting Systems Integrity”
Effective information security systems incorporate a
range of policies, security products, technologies and      “If you think technology can
procedures. Software applications which provide            solve your security problems,
firewall information security and virus scanners are not   then you don't understand the
enough on their own to protect information. A set of           problems and you don't
procedures and systems needs to be applied to
                                                            understand the technology.”
effectively deter unauthorized access to information
assets.

Companies face threats to their employees, systems,        “Security must begin at the top
operations, and information every day. These threats          of an organization. It is a
include computer viruses, network attacks, fraud,
                                                           leadership issue, and the chief
industrial espionage, and even natural disasters.
                                                               executive must set the
                                                           example. — heard at a security
                                                                    conference”


                                                           “One of the tests of leadership
                                                            is the ability to recognize a
     10 questions to sensitize                             problem before it becomes an
                                                                    emergency”
       the IT / IS Security …

1. Does anyone in the management identify the disgruntled employee before he does
   any harm to company’s business?

2. Does management aware what is the current exposure on information security?

3. Would people recognize a security incident when they saw one? Would they ignore
   it? Would they know what to do about it?

4. Does anyone know how many computers the company owns? Would management
   know if some went missing?

5. Does anyone know how many people are using the organization’s systems? Does
   anybody care whether they are allowed or not, or what they are doing?

6. Did the company suffer from the latest virus attack? How many did it have last year?

7. What are the most critical information assets of the enterprise? Does management
   know where the enterprise is most vulnerable?

8. Is management concerned that company confidential information can be leaked?

9. Has the organization ever had its network security checked by a third party?

10. Is IT security a regular agenda item on IT management meetings?
Techserv is absolutely committed to helping people and
  organizations grow and succeed. Guided by our fundamental
  belief of integrity and professionalism, we promise a best
  client experience. By applying our rich expertise and our
I focused methodologies, we will provide honest advice to help
  you reach your business objectives and transform challenges
  into new possibilities.


   OUR IT SECURITY ASSURANCE APPROACH IS DRIVEN BY …..

                                                                                                  LAWS &
    BUSINESS GOALS                                    COBIT
                                                                                                REGULATIONS



                                                     ISO 27001



      Effectiveness     Deals with information being relevant and pertinent to the business process as well as being
                        delivered in a timely, correct, consistent and usable manner.



        Efficiency      Concerns the provision of information through the optimal (most productive and economical)
                        use of resources.



      Confidentiality   Concerns the protection of sensitive information from unauthorized disclosure.




         Integrity      Relates to the accuracy and completeness of information as well as to its validity in
                        accordance with business values and expectations.



       Availability     Relates to information being available when required by the business process now and in the
                        future. It also concerns the safeguarding of necessary resources and associated capabilities.



       Compliance       Deals with complying with the laws, regulations and contractual arrangements to which the
                        business process is subject, i.e., externally imposed business criteria as well as internal
                        policies.


        Reliability     relates to the provision of appropriate information for management to operate the entity and
                        exercise its fiduciary and governance responsibilities.
TECHSERV’S IT SECURITY METHODOLOGY ….




          IT/IS GOVERNANCE          PROPOSAL         AWARENESS          PLAN          PROJECT
           NEEDS                                                     PROGRAMME        KICK-OFF




                       ENVISION                         RISK                           IDENTIFY
                       SOLUTION                                     ARCHITECTURE
                                                     ASSESSMENT                       CONTROLS




                                  DESIGN                               DESIGN          DESIGN
                                  CONTROLS                            PLANNING        CONTROLS




                                     IMPLEMENT
                                                     TRAINNING       IMPLEMENT          AUDIT
                                      SOLUTION




                                                 OPERATIONLIZE
                                                 SOLUTION           IMPROVEMENTS      MEASURE




                                                           Arul nambi
                                                           Cell +91 9892504538
                                                           Tel. 91 – 22 – 28573170
                                                           E-MAIL : aruln@techservconsult.com
                                                           www.techservconsult.com
“Promoting Systems Integrity”

More Related Content

What's hot

What's hot (20)

ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 

Viewers also liked

ISO/I20000 in a nutshell
ISO/I20000 in a nutshellISO/I20000 in a nutshell
ISO/I20000 in a nutshell
Caroline Mouton
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementation
IITSW Company
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
Uppala Anand
 

Viewers also liked (14)

IT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTINGIT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTING
 
IT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCINGIT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCING
 
Governance consulting for small and medium enterprise growth oriented companies
Governance consulting for small and medium enterprise growth oriented companiesGovernance consulting for small and medium enterprise growth oriented companies
Governance consulting for small and medium enterprise growth oriented companies
 
It governance product
It governance productIt governance product
It governance product
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
ISO/I20000 in a nutshell
ISO/I20000 in a nutshellISO/I20000 in a nutshell
ISO/I20000 in a nutshell
 
Smart PPT Presentation
Smart PPT PresentationSmart PPT Presentation
Smart PPT Presentation
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000
 
ISO 9001 IMPLEMENTATION METHODOLOGY
ISO 9001 IMPLEMENTATION METHODOLOGYISO 9001 IMPLEMENTATION METHODOLOGY
ISO 9001 IMPLEMENTATION METHODOLOGY
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementation
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Introduction to ISO 9001:2015
Introduction to ISO 9001:2015Introduction to ISO 9001:2015
Introduction to ISO 9001:2015
 

Similar to ISO 27001 - IMPLEMENTATION CONSULTING

Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
nooralmousa
 
IT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product SolutionIT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product Solution
Arul Nambi
 
Ta Security
Ta SecurityTa Security
Ta Security
jothsna
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
rhanna11
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controls
Interop
 
IT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCINGIT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCING
Arul Nambi
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
GuardEra Access Solutions, Inc.
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
Carl Booth
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
subramanian K
 

Similar to ISO 27001 - IMPLEMENTATION CONSULTING (20)

Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
IT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product SolutionIT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product Solution
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controls
 
IT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCINGIT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCING
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 

More from Arul Nambi (17)

Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
PRODUCT DEVELOPMENT METHODOLOGY
PRODUCT DEVELOPMENT METHODOLOGYPRODUCT DEVELOPMENT METHODOLOGY
PRODUCT DEVELOPMENT METHODOLOGY
 
QUALITY AUDITORS TRAINING
QUALITY AUDITORS TRAININGQUALITY AUDITORS TRAINING
QUALITY AUDITORS TRAINING
 
IT PROJECT MANAGEMENT TRAINING
IT PROJECT MANAGEMENT TRAININGIT PROJECT MANAGEMENT TRAINING
IT PROJECT MANAGEMENT TRAINING
 
PROCESS DOCUMENTATION
PROCESS DOCUMENTATIONPROCESS DOCUMENTATION
PROCESS DOCUMENTATION
 
OUTSOURCING ASSURANCE
OUTSOURCING ASSURANCEOUTSOURCING ASSURANCE
OUTSOURCING ASSURANCE
 
IT AUDITORS TRAINING
IT AUDITORS TRAININGIT AUDITORS TRAINING
IT AUDITORS TRAINING
 
ISO 9001 CONSULTING
ISO 9001 CONSULTINGISO 9001 CONSULTING
ISO 9001 CONSULTING
 
CMMI CONSULTING
CMMI CONSULTINGCMMI CONSULTING
CMMI CONSULTING
 
SYSTEMS AUDIT
SYSTEMS AUDITSYSTEMS AUDIT
SYSTEMS AUDIT
 
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORKSOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
 
CMMI CONSULTING
CMMI CONSULTINGCMMI CONSULTING
CMMI CONSULTING
 
IT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCEIT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCE
 
ASSURANCE
ASSURANCEASSURANCE
ASSURANCE
 
SAMPLE PROCESS - TEMPLATE
SAMPLE PROCESS - TEMPLATESAMPLE PROCESS - TEMPLATE
SAMPLE PROCESS - TEMPLATE
 
IT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCEIT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCE
 
INDEPEDENT OUTSOURCING ASSURANCE
INDEPEDENT OUTSOURCING ASSURANCEINDEPEDENT OUTSOURCING ASSURANCE
INDEPEDENT OUTSOURCING ASSURANCE
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 

Recently uploaded (20)

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 

ISO 27001 - IMPLEMENTATION CONSULTING

  • 1. Techserv ISO 27001 Executive Brief ISO 27001 IT / IS SECURITY Our Approach Ownership . Practical . Effective “Promoting Systems Integrity”
  • 2. Effective information security systems incorporate a range of policies, security products, technologies and “If you think technology can procedures. Software applications which provide solve your security problems, firewall information security and virus scanners are not then you don't understand the enough on their own to protect information. A set of problems and you don't procedures and systems needs to be applied to understand the technology.” effectively deter unauthorized access to information assets. Companies face threats to their employees, systems, “Security must begin at the top operations, and information every day. These threats of an organization. It is a include computer viruses, network attacks, fraud, leadership issue, and the chief industrial espionage, and even natural disasters. executive must set the example. — heard at a security conference” “One of the tests of leadership is the ability to recognize a 10 questions to sensitize problem before it becomes an emergency” the IT / IS Security … 1. Does anyone in the management identify the disgruntled employee before he does any harm to company’s business? 2. Does management aware what is the current exposure on information security? 3. Would people recognize a security incident when they saw one? Would they ignore it? Would they know what to do about it? 4. Does anyone know how many computers the company owns? Would management know if some went missing? 5. Does anyone know how many people are using the organization’s systems? Does anybody care whether they are allowed or not, or what they are doing? 6. Did the company suffer from the latest virus attack? How many did it have last year? 7. What are the most critical information assets of the enterprise? Does management know where the enterprise is most vulnerable? 8. Is management concerned that company confidential information can be leaked? 9. Has the organization ever had its network security checked by a third party? 10. Is IT security a regular agenda item on IT management meetings?
  • 3. Techserv is absolutely committed to helping people and organizations grow and succeed. Guided by our fundamental belief of integrity and professionalism, we promise a best client experience. By applying our rich expertise and our I focused methodologies, we will provide honest advice to help you reach your business objectives and transform challenges into new possibilities. OUR IT SECURITY ASSURANCE APPROACH IS DRIVEN BY ….. LAWS & BUSINESS GOALS COBIT REGULATIONS ISO 27001 Effectiveness Deals with information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent and usable manner. Efficiency Concerns the provision of information through the optimal (most productive and economical) use of resources. Confidentiality Concerns the protection of sensitive information from unauthorized disclosure. Integrity Relates to the accuracy and completeness of information as well as to its validity in accordance with business values and expectations. Availability Relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities. Compliance Deals with complying with the laws, regulations and contractual arrangements to which the business process is subject, i.e., externally imposed business criteria as well as internal policies. Reliability relates to the provision of appropriate information for management to operate the entity and exercise its fiduciary and governance responsibilities.
  • 4. TECHSERV’S IT SECURITY METHODOLOGY …. IT/IS GOVERNANCE PROPOSAL AWARENESS PLAN PROJECT NEEDS PROGRAMME KICK-OFF ENVISION RISK IDENTIFY SOLUTION ARCHITECTURE ASSESSMENT CONTROLS DESIGN DESIGN DESIGN CONTROLS PLANNING CONTROLS IMPLEMENT TRAINNING IMPLEMENT AUDIT SOLUTION OPERATIONLIZE SOLUTION IMPROVEMENTS MEASURE Arul nambi Cell +91 9892504538 Tel. 91 – 22 – 28573170 E-MAIL : aruln@techservconsult.com www.techservconsult.com “Promoting Systems Integrity”