SlideShare a Scribd company logo
1 of 14
How to create plan-of-
action to secure critical
information
Securing Critical
Information
With a wide spectrum of networked data
communication channels and cloud computing, it is
more confronting to secure the critical information
thereby making cyber security the most challenging.
An organized approach is required to plan the
efficient security system.
01
Step-by-step Strategies To Secure Critical Information
02
Identify what is critical
Develop and Approve a Security Policy
Make your employees policy aware
Maintain a process to report progress
Segregate the undesired and desired data
Identify what is critical
• Identify the information that is actually critical along with the infrastructure containing the same.
It also vital to analyze the people whom this information and security measures can impact.
02
Develop and Approve a Security Policy
• For every organization, it is evident to have a security policy that resolves the infrastructure
security threats. Organizations can develop their own security policies, approve them and
promote the same as per the ISO 17799 code standards of information security best practices.
02
Make your employees policy aware
• There is no point developing and approving a policy unless the employees are not aware of the
promoted security policy. It is the responsibility of every employee to ensure that the security
policy must be followed. A training program should be conducted for all employees and every
time whenever the policy is revised.
02
Maintain a process to report progress
• A progress report should be submitted to the executive committee and the Security Advisory
Committee stating the assessment details. This process must be scheduled for a regular basis.
02
Segregate the undesired and desired data
• Data inventory must be analyzed so as to identify the data that is actually useful and protected.
Accordingly sensitively data that is no longer required must be purged after segregation.
02
07
Popular Courses:
CEH/ Advance
Penetration Testing
with Backtrack
Certified Ethical Hacker
and Advanced Penetration
Testing with BackTrack is
an extensive combo to
equip the IT aspirants with
IT security and ethical
hacking skills.
Computer Hacking Forensic
Investigator
This course helps IT aspirants
in certifying the ethical
hacking skills around a specific
security discipline of computer
forensics from a vendor-
neutral perspective.
ECSA
EC-Council Certified Security
Analyst (ECSA V8)
complements the Certified
Ethical Hacker (CEH)
certification by exploring the
analytical phase of ethical
hacking
07
Some of our Training Gems:
Koenig training services are sought by some of the biggest multinationals and Fortune 500 companies.
Some of the brand names associated with Koenig for its world renowned IT training include:
Our Valuable Customers
24
27
• Nearly half the cost as compared to similar training in UK or USA.
• Experienced pool of 350+ certified trainers
• Happiness Guaranteed else Money Back or Class Redo
• Authorized partner for 30+large IT vendors
• Multiple modes of delivery
• Customizable learning packages
• World class training centres with best infrastructure
• Post training support
• Excursion to local tourist attractions
• Best accommodation and support services
• Visa Guidance
Advantages @ Koenig
Let’s Talk
Koenig Delhi
Koenig Campus B-39, Plot No. 70,
KLJ Complex-1, Shivaji Marg, Moti
Nagar, New Delhi-110015 (India)
Koenig Bangalore
PARAGON PRIMA, 2nd & 3rd Floor,
No. 39, 8th Main Koramangala 4th
Block Bengaluru-560034, (India)
Koenig Goa
3rd Floor, B/T1, Campal Trade Centre,
Opp. Kala Academy, Panjim,
Goa-403001 (India)
33
Koenig Shimla
7, Prospect Lodge, Behind YMCA,
Lower Jakhu, Shimla-171001,
Himachal Pradesh (India)
Koenig Dehradun
Plot #22, IT Park, Sahastradhara
Road, Dehradun-248001,
Uttarakhand (India)
Koenig Dubai
Block 3, Office G10,
Dubai Knowledge Village Dubai, UAE
Phone : +9714 3686241
Email : info@Koenig-dubai.com
Koenig USA
640 W California Avenue, Suite 210,
Sunnyvale, CA 94086, USA
Koenig Singapore
30 Cecil Street, #19-08 Prudential
Tower, Singapore 049712
Koenig Solutions (India)
Website: www.koenig-solutions.com
Phone : +91 75330 08521 (24x7)
Email : info@Koenig-solutions.com
THANK YOU
Follow us:
http://www.Koenig-solutions.com

More Related Content

What's hot

Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseShivamSharma909
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Benoît H. Dicaire
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseKevin Duffey
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseMart Rovers
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI CertificationSagarNegi10
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Servicessahrens1
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 

What's hot (20)

Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
___2360_SP_VMAN---Screen
___2360_SP_VMAN---Screen___2360_SP_VMAN---Screen
___2360_SP_VMAN---Screen
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 

Viewers also liked

Попов василий григорьевич
Попов василий григорьевичПопов василий григорьевич
Попов василий григорьевичTitenko1
 
толерантность
толерантностьтолерантность
толерантностьTitenko1
 
25 апреля субботник
25 апреля субботник25 апреля субботник
25 апреля субботникTitenko1
 
Www.laplantcompany.com
Www.laplantcompany.comWww.laplantcompany.com
Www.laplantcompany.comrosemoonjek
 
Процессор
ПроцессорПроцессор
ПроцессорTitenko1
 
копия плюша в болгарии
копия плюша  в  болгариикопия плюша  в  болгарии
копия плюша в болгарииLudmila1955
 
Особенности проведения гиа в 2015 году
Особенности проведения гиа в 2015 годуОсобенности проведения гиа в 2015 году
Особенности проведения гиа в 2015 годуTitenko1
 
Germany last 10 year economy report
Germany last 10 year economy reportGermany last 10 year economy report
Germany last 10 year economy reportAbhishek Kumar
 
итоги 3 четверти на сайт
итоги 3 четверти  на сайтитоги 3 четверти  на сайт
итоги 3 четверти на сайтTitenko1
 
Communication technology in 2022
Communication technology in 2022Communication technology in 2022
Communication technology in 2022vmvogt01
 
Things to know about Oracle GoldenGate
Things to know about Oracle GoldenGateThings to know about Oracle GoldenGate
Things to know about Oracle GoldenGateKoenig Solutions Ltd.
 
гиа 9-2017
гиа 9-2017гиа 9-2017
гиа 9-2017Titenko1
 
Www.vermontgoodwood.com
Www.vermontgoodwood.comWww.vermontgoodwood.com
Www.vermontgoodwood.comrosemoonjek
 
Питание
ПитаниеПитание
ПитаниеTitenko1
 
плюша в болгарии
плюша  в  болгарииплюша  в  болгарии
плюша в болгарииLudmila1955
 

Viewers also liked (19)

Попов василий григорьевич
Попов василий григорьевичПопов василий григорьевич
Попов василий григорьевич
 
толерантность
толерантностьтолерантность
толерантность
 
25 апреля субботник
25 апреля субботник25 апреля субботник
25 апреля субботник
 
Top Benefits of ITIL Certification
Top Benefits of ITIL CertificationTop Benefits of ITIL Certification
Top Benefits of ITIL Certification
 
Www.laplantcompany.com
Www.laplantcompany.comWww.laplantcompany.com
Www.laplantcompany.com
 
Процессор
ПроцессорПроцессор
Процессор
 
копия плюша в болгарии
копия плюша  в  болгариикопия плюша  в  болгарии
копия плюша в болгарии
 
Особенности проведения гиа в 2015 году
Особенности проведения гиа в 2015 годуОсобенности проведения гиа в 2015 году
Особенности проведения гиа в 2015 году
 
Germany last 10 year economy report
Germany last 10 year economy reportGermany last 10 year economy report
Germany last 10 year economy report
 
итоги 3 четверти на сайт
итоги 3 четверти  на сайтитоги 3 четверти  на сайт
итоги 3 четверти на сайт
 
Communication technology in 2022
Communication technology in 2022Communication technology in 2022
Communication technology in 2022
 
Things to know about Oracle GoldenGate
Things to know about Oracle GoldenGateThings to know about Oracle GoldenGate
Things to know about Oracle GoldenGate
 
гиа 9-2017
гиа 9-2017гиа 9-2017
гиа 9-2017
 
Www.vermontgoodwood.com
Www.vermontgoodwood.comWww.vermontgoodwood.com
Www.vermontgoodwood.com
 
Питание
ПитаниеПитание
Питание
 
Capabilities of a good database
Capabilities of a good databaseCapabilities of a good database
Capabilities of a good database
 
плюша в болгарии
плюша  в  болгарииплюша  в  болгарии
плюша в болгарии
 
Koenig Corporate Presentation
Koenig Corporate PresentationKoenig Corporate Presentation
Koenig Corporate Presentation
 
Abhishek kumar
Abhishek kumarAbhishek kumar
Abhishek kumar
 

Similar to How to Create Plan-of-Action to Secure Critical Information

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWithum
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)GTS Learning, Inc.
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security CertificationsNithin Sai
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 

Similar to How to Create Plan-of-Action to Secure Critical Information (20)

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 

More from Koenig Solutions Ltd.

Best cyber security certifications 2017
Best cyber security certifications 2017Best cyber security certifications 2017
Best cyber security certifications 2017Koenig Solutions Ltd.
 
Top 7 Tips and Shortcuts for MS Outlook 2013
Top 7 Tips and Shortcuts for MS Outlook 2013Top 7 Tips and Shortcuts for MS Outlook 2013
Top 7 Tips and Shortcuts for MS Outlook 2013Koenig Solutions Ltd.
 
10 tips for successful project management
10 tips for successful project management10 tips for successful project management
10 tips for successful project managementKoenig Solutions Ltd.
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical HackingKoenig Solutions Ltd.
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

More from Koenig Solutions Ltd. (8)

Best cyber security certifications 2017
Best cyber security certifications 2017Best cyber security certifications 2017
Best cyber security certifications 2017
 
Top 7 Tips and Shortcuts for MS Outlook 2013
Top 7 Tips and Shortcuts for MS Outlook 2013Top 7 Tips and Shortcuts for MS Outlook 2013
Top 7 Tips and Shortcuts for MS Outlook 2013
 
10 tips for successful project management
10 tips for successful project management10 tips for successful project management
10 tips for successful project management
 
Top 7 productivity apps
Top 7 productivity appsTop 7 productivity apps
Top 7 productivity apps
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Azure training
Azure trainingAzure training
Azure training
 
Top 5 Microsoft Certifications
Top 5 Microsoft CertificationsTop 5 Microsoft Certifications
Top 5 Microsoft Certifications
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

How to Create Plan-of-Action to Secure Critical Information

  • 1. How to create plan-of- action to secure critical information
  • 2. Securing Critical Information With a wide spectrum of networked data communication channels and cloud computing, it is more confronting to secure the critical information thereby making cyber security the most challenging. An organized approach is required to plan the efficient security system. 01
  • 3. Step-by-step Strategies To Secure Critical Information 02 Identify what is critical Develop and Approve a Security Policy Make your employees policy aware Maintain a process to report progress Segregate the undesired and desired data
  • 4. Identify what is critical • Identify the information that is actually critical along with the infrastructure containing the same. It also vital to analyze the people whom this information and security measures can impact. 02
  • 5. Develop and Approve a Security Policy • For every organization, it is evident to have a security policy that resolves the infrastructure security threats. Organizations can develop their own security policies, approve them and promote the same as per the ISO 17799 code standards of information security best practices. 02
  • 6. Make your employees policy aware • There is no point developing and approving a policy unless the employees are not aware of the promoted security policy. It is the responsibility of every employee to ensure that the security policy must be followed. A training program should be conducted for all employees and every time whenever the policy is revised. 02
  • 7. Maintain a process to report progress • A progress report should be submitted to the executive committee and the Security Advisory Committee stating the assessment details. This process must be scheduled for a regular basis. 02
  • 8. Segregate the undesired and desired data • Data inventory must be analyzed so as to identify the data that is actually useful and protected. Accordingly sensitively data that is no longer required must be purged after segregation. 02
  • 9. 07 Popular Courses: CEH/ Advance Penetration Testing with Backtrack Certified Ethical Hacker and Advanced Penetration Testing with BackTrack is an extensive combo to equip the IT aspirants with IT security and ethical hacking skills. Computer Hacking Forensic Investigator This course helps IT aspirants in certifying the ethical hacking skills around a specific security discipline of computer forensics from a vendor- neutral perspective. ECSA EC-Council Certified Security Analyst (ECSA V8) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking
  • 10. 07 Some of our Training Gems:
  • 11. Koenig training services are sought by some of the biggest multinationals and Fortune 500 companies. Some of the brand names associated with Koenig for its world renowned IT training include: Our Valuable Customers 24
  • 12. 27 • Nearly half the cost as compared to similar training in UK or USA. • Experienced pool of 350+ certified trainers • Happiness Guaranteed else Money Back or Class Redo • Authorized partner for 30+large IT vendors • Multiple modes of delivery • Customizable learning packages • World class training centres with best infrastructure • Post training support • Excursion to local tourist attractions • Best accommodation and support services • Visa Guidance Advantages @ Koenig
  • 13. Let’s Talk Koenig Delhi Koenig Campus B-39, Plot No. 70, KLJ Complex-1, Shivaji Marg, Moti Nagar, New Delhi-110015 (India) Koenig Bangalore PARAGON PRIMA, 2nd & 3rd Floor, No. 39, 8th Main Koramangala 4th Block Bengaluru-560034, (India) Koenig Goa 3rd Floor, B/T1, Campal Trade Centre, Opp. Kala Academy, Panjim, Goa-403001 (India) 33 Koenig Shimla 7, Prospect Lodge, Behind YMCA, Lower Jakhu, Shimla-171001, Himachal Pradesh (India) Koenig Dehradun Plot #22, IT Park, Sahastradhara Road, Dehradun-248001, Uttarakhand (India) Koenig Dubai Block 3, Office G10, Dubai Knowledge Village Dubai, UAE Phone : +9714 3686241 Email : info@Koenig-dubai.com Koenig USA 640 W California Avenue, Suite 210, Sunnyvale, CA 94086, USA Koenig Singapore 30 Cecil Street, #19-08 Prudential Tower, Singapore 049712 Koenig Solutions (India) Website: www.koenig-solutions.com Phone : +91 75330 08521 (24x7) Email : info@Koenig-solutions.com