SlideShare a Scribd company logo
1 of 22
iFour Consultancy 
Security awareness seminar 
An introduction to ISO27k 
Part 3
Agenda 
 ISO 27001 
 A brief history of ISO27k 
 Plan-Do-Check-Act 
 CONTROL CLAUSES 
 IMPLEMENTATION PROCESS CYCLE 
 Benefits 
 Information security vision 
 Who is responsible? 
 Corporate Information Security Policy 
 Physical security 
 Password Guidelines 
 Internet usage 
 E-mail usage 
 Security incidents 
 Responsibilities 
http://www.ifour-consultancy.com Software outsourcing company in India
ISO 27001 
 ISO/IEC 27001 is an information security management system (ISMS) standard published by ISO & IEC 
 It specifies the requirements for establishing, implementing, operating, monitoring, reviewing, 
maintaining and improving a documented Information Security Management System (ISMS) within an 
organisation 
 It is designed to ensure the selection of adequate and proportionate security controls to protect 
information assets 
http://www.ifour-consultancy.com Software outsourcing company in India
http://www.ifour-consultancy.com Software outsourcing company in India
A brief history of ISO27k 
1990’s 
• Information Security Management Code of Practice produced by a UK government-sponsored working 
group 
• Based on the security policy used by Shell 
• Became British Standard BS7799 
2000’s 
• Adopted by ISO/IEC 
• Became ISO/IEC 17799 (later renumbered ISO/IEC 27002) 
• ISO/IEC 27001 published & certification scheme started 
Now 
• Expanding into a suite of information security standards (known as “ISO27k”) 
• Updated and reissued every few years 
http://www.ifour-consultancy.com Software outsourcing company in India
ISO 27001 
• Concerns the management of information security, not just 
IT/technical security 
• Formally specifies a management system 
• Uses Plan, Do, Check, Act (PDCA) to achieve, maintain and improve 
alignment of security with risks 
• Covers all types of organizations (e.g. commercial companies, 
government agencies, not-for-profit organizations) and all sizes 
• Thousands of organizations worldwide have been certified compliant 
http://www.ifour-consultancy.com Software outsourcing company in India
Plan-Do-Check-Act 
http://www.ifour-consultancy.com Software outsourcing company in India
CONTROL CLAUSES 
http://www.ifour-consultancy.com Software outsourcing company in India
CONTROL CLAUSES 
 Information security policy - management direction 
 Organization of information security - management framework for 
implementation 
 Asset management – assessment, classification and protection of valuable 
information assets 
 HR security – security for joiners, movers and leavers 
 Physical & environmental security - prevents unauthorised access, theft, 
compromise, damage to information and computing facilities, power cuts 
http://www.ifour-consultancy.com Software outsourcing company in India
CONTROL CLAUSES 
• Communications & operations management - ensures the correct and secure 
operation of IT 
• Access control – restrict unauthorized access to information assets 
• Information systems acquisition, development & maintenance – build security into 
systems 
• Information security incident management – deal sensibly with security incidents that 
arise 
• Business continuity management – maintain essential business processes and restore 
any that fail 
• Compliance - avoid breaching laws, regulations, policies and other security obligations 
http://www.ifour-consultancy.com Software outsourcing company in India
IMPLEMENTATION PROCESS CYCLE 
ASSET 
IDENTIFICATION 
& 
CLASSIFICATION 
http://www.ifour-consultancy.com Software outsourcing company in India
Benefits 
 Demonstrable commitment to security by the 
organization 
 Legal and regulatory compliance 
 Better risk management 
 Commercial credibility, confidence, and assurance 
 Reduced costs 
 Clear employee direction and improved awareness 
http://www.ifour-consultancy.com Software outsourcing company in India
Information security vision 
• Vision 
The organization is acknowledged as an industry leader for information 
security. 
• Mission 
To design, implement, operate, manage and maintain an Information 
Security Management System that complies with international standards, 
incorporating generally-accepted good security practices 
http://www.ifour-consultancy.com Software outsourcing company in India
Who is responsible? 
• Information Security Management Committee 
• Information Security Manager/CISO and Department 
• Incident Response Team 
• Business Continuity Team 
• IT, Legal/Compliance, HR, Risk and other departments 
• Audit Committee 
• Last but not least, you 
Information security is everyone’s responsibility 
http://www.ifour-consultancy.com Software outsourcing company in India
Corporate Information Security Policy 
Policy is signed by the CEO and 
mandated by top management 
Find it on the intranet 
http://www.ifour-consultancy.com Software outsourcing company in India
Physical security 
http://www.ifour-consultancy.com Software outsourcing company in India
Password Guidelines 
http://www.ifour-consultancy.com Software outsourcing company in India
Internet usage 
http://www.ifour-consultancy.com Software outsourcing company in India
E-mail usage 
 Use corporate email for business purposes only 
 Follow the email storage guidelines 
 If you receive spam email, simply delete it. If it is 
offensive or you receive a lot, call the IT Help/Service 
Desk 
 Do not use your corporate email address for personal email 
 Do not circulate chain letters, hoaxes, inappropriate jokes, 
videos etc. 
 Do not send emails outside the organization unless you are 
authorized to do so 
 Be very wary of email attachments and links, especially in 
unsolicited emails (most are virus-infected) 
http://www.ifour-consultancy.com Software outsourcing company in India
Security incidents 
 Report information security incidents, concerns and 
near-misses to IT Help/Service Desk: 
 Email … 
 Telephone … 
 Anonymous drop-boxes … 
 Take their advice on what to do 
 Do not discuss security incidents with anyone outside the 
organization 
 Do not attempt to interfere with, obstruct or prevent anyone 
else from reporting incidents
Responsibilities 
 Ensure your PC is getting antivirus updates and patches 
 Lock your keyboard (Windows-L) before leaving your PC unattended, and log-off at the end of the 
day 
 Store valuable information (paperwork as well as CDs, USB sticks etc.) securely under lock and key 
 Take regular information back ups 
 Fulfill your security obligations: 
 Comply with security and privacy laws, copyright and licenses, NDA (Non Disclosure Agreements) and 
contracts 
 Comply with corporate policies and procedures 
 Stay up to date on information security: 
 Visit the intranet Security Zone when you have a moment 
http://www.ifour-consultancy.com Software outsourcing company in India
http://www.ifour-consultancy.com Software outsourcing company in India

More Related Content

What's hot

ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 

What's hot (20)

Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 

Similar to ISO 27001 - Information security user awareness training presentation - part 3

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overview
Kevin Orth
 

Similar to ISO 27001 - Information security user awareness training presentation - part 3 (20)

Information security
Information securityInformation security
Information security
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Role management
Role managementRole management
Role management
 
Protect Intellectual Property While Offshore Outsourcing
Protect Intellectual Property  While Offshore OutsourcingProtect Intellectual Property  While Offshore Outsourcing
Protect Intellectual Property While Offshore Outsourcing
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
ISO 27001 Information Security Management.pdf
ISO 27001 Information Security Management.pdfISO 27001 Information Security Management.pdf
ISO 27001 Information Security Management.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overview
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overview
 
What Is the Scope of ISO 27001 Certification in the Netherlands.pptx
What Is the Scope of ISO 27001 Certification in the Netherlands.pptxWhat Is the Scope of ISO 27001 Certification in the Netherlands.pptx
What Is the Scope of ISO 27001 Certification in the Netherlands.pptx
 
6 things you probably didn't know about iso 27001 certification in the nether...
6 things you probably didn't know about iso 27001 certification in the nether...6 things you probably didn't know about iso 27001 certification in the nether...
6 things you probably didn't know about iso 27001 certification in the nether...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

ISO 27001 - Information security user awareness training presentation - part 3

  • 1. iFour Consultancy Security awareness seminar An introduction to ISO27k Part 3
  • 2. Agenda  ISO 27001  A brief history of ISO27k  Plan-Do-Check-Act  CONTROL CLAUSES  IMPLEMENTATION PROCESS CYCLE  Benefits  Information security vision  Who is responsible?  Corporate Information Security Policy  Physical security  Password Guidelines  Internet usage  E-mail usage  Security incidents  Responsibilities http://www.ifour-consultancy.com Software outsourcing company in India
  • 3. ISO 27001  ISO/IEC 27001 is an information security management system (ISMS) standard published by ISO & IEC  It specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System (ISMS) within an organisation  It is designed to ensure the selection of adequate and proportionate security controls to protect information assets http://www.ifour-consultancy.com Software outsourcing company in India
  • 5. A brief history of ISO27k 1990’s • Information Security Management Code of Practice produced by a UK government-sponsored working group • Based on the security policy used by Shell • Became British Standard BS7799 2000’s • Adopted by ISO/IEC • Became ISO/IEC 17799 (later renumbered ISO/IEC 27002) • ISO/IEC 27001 published & certification scheme started Now • Expanding into a suite of information security standards (known as “ISO27k”) • Updated and reissued every few years http://www.ifour-consultancy.com Software outsourcing company in India
  • 6. ISO 27001 • Concerns the management of information security, not just IT/technical security • Formally specifies a management system • Uses Plan, Do, Check, Act (PDCA) to achieve, maintain and improve alignment of security with risks • Covers all types of organizations (e.g. commercial companies, government agencies, not-for-profit organizations) and all sizes • Thousands of organizations worldwide have been certified compliant http://www.ifour-consultancy.com Software outsourcing company in India
  • 8. CONTROL CLAUSES http://www.ifour-consultancy.com Software outsourcing company in India
  • 9. CONTROL CLAUSES  Information security policy - management direction  Organization of information security - management framework for implementation  Asset management – assessment, classification and protection of valuable information assets  HR security – security for joiners, movers and leavers  Physical & environmental security - prevents unauthorised access, theft, compromise, damage to information and computing facilities, power cuts http://www.ifour-consultancy.com Software outsourcing company in India
  • 10. CONTROL CLAUSES • Communications & operations management - ensures the correct and secure operation of IT • Access control – restrict unauthorized access to information assets • Information systems acquisition, development & maintenance – build security into systems • Information security incident management – deal sensibly with security incidents that arise • Business continuity management – maintain essential business processes and restore any that fail • Compliance - avoid breaching laws, regulations, policies and other security obligations http://www.ifour-consultancy.com Software outsourcing company in India
  • 11. IMPLEMENTATION PROCESS CYCLE ASSET IDENTIFICATION & CLASSIFICATION http://www.ifour-consultancy.com Software outsourcing company in India
  • 12. Benefits  Demonstrable commitment to security by the organization  Legal and regulatory compliance  Better risk management  Commercial credibility, confidence, and assurance  Reduced costs  Clear employee direction and improved awareness http://www.ifour-consultancy.com Software outsourcing company in India
  • 13. Information security vision • Vision The organization is acknowledged as an industry leader for information security. • Mission To design, implement, operate, manage and maintain an Information Security Management System that complies with international standards, incorporating generally-accepted good security practices http://www.ifour-consultancy.com Software outsourcing company in India
  • 14. Who is responsible? • Information Security Management Committee • Information Security Manager/CISO and Department • Incident Response Team • Business Continuity Team • IT, Legal/Compliance, HR, Risk and other departments • Audit Committee • Last but not least, you Information security is everyone’s responsibility http://www.ifour-consultancy.com Software outsourcing company in India
  • 15. Corporate Information Security Policy Policy is signed by the CEO and mandated by top management Find it on the intranet http://www.ifour-consultancy.com Software outsourcing company in India
  • 16. Physical security http://www.ifour-consultancy.com Software outsourcing company in India
  • 17. Password Guidelines http://www.ifour-consultancy.com Software outsourcing company in India
  • 18. Internet usage http://www.ifour-consultancy.com Software outsourcing company in India
  • 19. E-mail usage  Use corporate email for business purposes only  Follow the email storage guidelines  If you receive spam email, simply delete it. If it is offensive or you receive a lot, call the IT Help/Service Desk  Do not use your corporate email address for personal email  Do not circulate chain letters, hoaxes, inappropriate jokes, videos etc.  Do not send emails outside the organization unless you are authorized to do so  Be very wary of email attachments and links, especially in unsolicited emails (most are virus-infected) http://www.ifour-consultancy.com Software outsourcing company in India
  • 20. Security incidents  Report information security incidents, concerns and near-misses to IT Help/Service Desk:  Email …  Telephone …  Anonymous drop-boxes …  Take their advice on what to do  Do not discuss security incidents with anyone outside the organization  Do not attempt to interfere with, obstruct or prevent anyone else from reporting incidents
  • 21. Responsibilities  Ensure your PC is getting antivirus updates and patches  Lock your keyboard (Windows-L) before leaving your PC unattended, and log-off at the end of the day  Store valuable information (paperwork as well as CDs, USB sticks etc.) securely under lock and key  Take regular information back ups  Fulfill your security obligations:  Comply with security and privacy laws, copyright and licenses, NDA (Non Disclosure Agreements) and contracts  Comply with corporate policies and procedures  Stay up to date on information security:  Visit the intranet Security Zone when you have a moment http://www.ifour-consultancy.com Software outsourcing company in India

Editor's Notes

  1. Software outsourcing company in India
  2. Software outsourcing company in India
  3. Software outsourcing company in India
  4. Software outsourcing company in India
  5. Software outsourcing company in India
  6. Software outsourcing company in India
  7. Software outsourcing company in India
  8. Software outsourcing company in India
  9. Software outsourcing company in India
  10. Software outsourcing company in India
  11. Software outsourcing company in India
  12. Software outsourcing company in India
  13. Software outsourcing company in India
  14. Software outsourcing company in India
  15. Software outsourcing company in India
  16. Software outsourcing company in India
  17. Software outsourcing company in India
  18. Software outsourcing company in India
  19. Software outsourcing company in India
  20. Software outsourcing company in India
  21. Software outsourcing company in India
  22. Software outsourcing company in India