SlideShare a Scribd company logo
1 of 27
Hafiz Sheikh Adnan Ahmed
IT SECURITY & GRC CONSULTANT & INTERNAL AUDITOR
He is an IT GRC, Security Consultant and Lead Auditor and a PECB Certified Trainer with over 11
years of significant, progressive experience in Information Technology field, focusing on
Information Security, IT Governance, ISO Standards Implementation & Compliance, IT Service
Management, Risk Management, Information Security & IT Service Management Audits,
Software Project Management and Process Improvement. He has been awarded with ISACA
COBIT Certified Assessor by ISACA; only the 92nd worldwide and 8th in UAE. He has been
awarded with Security Advisor Middle East Awards 2016 in the category of “Personal
Contribution to IT Security”
Contact Information
+971-55-1862974
sh.adnan.ahmed@live.com
ae.linkedin.com/in/adnanahmed16/en
ShAdnanAhmed
AGENDA
• CIA – The Core of Information Security
• Myths about ISO 27001, ISO 20000, Project Management
• Understanding the Structure of New ISO Management System Requirements
• About COBIT 5
• High-Level Mapping of COBIT 5 to the new Management System’s Requirements
• Mapping of PMI Phases with COBIT 5
• Mapping of ISO 27001 and ISO 20000
• In Scope of ITIL, ISO 20000 and Project Management
PRE-REQUISITES
• Understanding of Information Security and ISO Frameworks
• Understanding of Project Management
• Knowledge of COBIT 5
MORNING NIGHTMARE - WHAT CAN GO
WRONG?
You're a new project manager, a bad week might go something like this:
• You open your email and see that one of your team member has inadvertently
forwarded a project business case to a competitor of your client.
• You’re planning for soft launch of new system before Going Live next week but
then you realize your inventory spreadsheet is corrupted.
• You’re about to walk into a meeting with your project sponsor and discover the
laptop where you’ve stored the presentation you’ve been working on for three
days has blue screened.
• Courier has misplaced confidential document sent by the Vendor which may
jeopardize the whole project schedule and current insurance policy does not
cover such loss
CIA – THE CORE OF INFORMATION SECURITY
• The job of Information Security is primarily to ensure CIA in place but there is a
common misconception that only IT is responsible for it. But they're not!! Then
who is responsible for Information Security in your organization or say for the
project you're managing, particularly for the project related to IT services being
provided to the end user
• Confidentiality means only authorized persons are able to see actual
information and protect actual information from being visible to all others
• Integrity is focused to keep information intact as intended and not altered and
must not allow unauthorized modification
• Availability is to ensure all authorized persons are able to access information
when required
• While it's not part of CIA, but Non-Repudiation is very significant especially in
term of regulator and legal issues. It's the assurance mechanism that sender or
receiver can’t deny after transmission
Let's think of below :
• Who is the information owner in the organization for a project?
• Who is to understand and conduct impact assessment?
• How to secure information flow/process in your project?
• PM is the one who:
• Should understand what are information risk concerning his/her project
• Interpret impact to senior management and customer for security issues
• Need to be able to decide on appropriate mitigating action
• Minimize the risk associated with information security threats/breaches.
• Include security considerations is integrated in every phase and process of a project;
and
• Ensure adherence to policy and standard/compliance
• So need to include Information Security within the project process right from the
initiation
5 GREATEST MYTHS ABOUT ISO 27001
• “The standard requires…”
• “We’ll let the IT department handle it”
• “We’ll implement it in a few months”
• “This standard is all about documentation”
• “The only benefit of the standard is for marketing purposes”
ISO/IEC 20000 – MYTHS AND TRUTHS
• Myth 1 – ISO/IEC 20000 is only for large commercial organizations
• Myth 2 – ISO/IEC 20000 is only applicable to IT infrastructure
• Myth 3 – ISO/IEC 20000 is of no value to internal service providers
• Myth 4 – Service providers must use ITIL® as the underlying framework
because ISO/IEC 20000 is based on ITIL
• Myth 5 – ISO/IEC 20000 will make my service management slow, more costly
and bureaucratic
TOP 5 MYTHS IN PROJECT MANAGEMENT
• Facts and figures are more important than feelings and perceptions
• Project managers need to be detail oriented and not strategic in nature
• Rely on the experts in everything that you do
• All the battles have to be fought and won so that we can succeed
• Project managers cannot be effective in their role unless they have specific
technical expertise in the given field that the project is within
UNDERSTANDING THE STRUCTURE OF NEW ISO
MANAGEMENT SYSTEM REQUIREMENTS
ABOUT COBIT 5
• COBIT, developed by ISACA, is a comprehensive IT Governance and Management
Framework accepted globally that deals with every aspect of IT and is the only
framework that addresses the complete life cycle of IT Investment
• Often viewed as the umbrella framework as it integrates all of the main global IT
standards
• Enables companies to improve IT Governance and Management by ensuring that
appropriate process, governance and management enablers are used to build IT
capabilities to achieve stakeholder goals
• Provides end-to-end business view that integrates other standards, frameworks and
guidelines, such as ITIL, ISO 27001, ISO 20000, ISO 31000 and Project Management,
into an overall enterprise governance and management framework
• COBIT 5 doesn’t replace these other sources of reference. Instead, it is an
overarching umbrella framework that helps them all fit together.
HIGH-LEVEL MAPPING OF COBIT 5 TO THE NEW
MANAGEMENT SYSTEM’S REQUIREMENTS
Clause No. Management System Requirements COBIT 5 Guidance
4
4. Context of the organization
4.1 Understanding the organization and its
context
4.2 Understanding the needs and expectations
of interested parties
4.3 Determining the scope of the information
security and service management systems
4.4 ISO 27001 and ISO 20000 management
systems
Pain points, trigger events, stakeholder drivers,
enterprise goals, IT-related goals and information
on related guidance
5
5. Leadership
5.1 Leadership and commitment
5.2 Policy
5.3 Organization roles, responsibilities and
authorities
Responsible, Accountable, Consulted and
(RACI) chart from EDM 01-05 processes
RACI chart from APO 06, APO 08, APO 09, APO
APO 12, APO 13, BAI 04, BAI 06, BAI 07, BAI 09,
10, DSS 01, DSS 02, DSS 03, DSS 04, DSS 05
Framework Principle and Policies—Appendix G,
COBIT 5 Framework
6
6. Planning
6.1 Actions to address risk and opportunities
6.2 ISO 27001 and ISO 20000 objectives and
planning to achieve them
Management practices from APO 06, APO 08,
09, APO 10, APO 12, APO 13, BAI 04, BAI 06, BAI
BAI 09, BAI 10, DSS 01, DSS 02, DSS 03, DSS 04,
DSS 05
…. CONT’D
Clause No. Management System Requirements COBIT 5 Guidance
7
7. Support
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communication
7.5 Documented information
7.5.1 General
7.5.2 Creating and updating
7.5.3 Control of documented
Enabler: People, Skills and Competencies
8
8. Operation
8.1 Operational planning and control
BAI 05
9
9. Performance evaluation
9.1 Monitoring, measurement, analysis and
evaluation
9.2 Internal audit
9.3 Management review
Lag and lead indicators
EDM 05, MEA 01, MEA 02, MEA 03
10
10. Improvement
10.1 Nonconformity and corrective action
MEA 01, MEA 02, MEA 03, Process goals
and metrics
MAPPING OF PMI PHASES WITH COBIT 5.0 & ISO
PROCESSES
PMI Phases Stages COBIT Process with Process ID ISO Process
Initiation Project Preparation
APO05 – Manage Portfolio Business Relationship
Management
Governance of Process
EDM02 – Ensure Benefits Delivery
Planning
Project Planning
BAI01 – Manage Programmes and
Projects
BAI02 – Manage Requirements
Service Level
Management
Business Blueprint
BAI03 – Manage Solutions Identification
and Build
Design and Transition of
new or changed
Execution
Realization
BAI03 – Manage Solutions Identification
and Build
Design and Transition of
new or changed
Final Preparation
BAI07 – Manage Change Acceptance
Transitioning
Release and
Go Live and
BAI07 – Manage Change Acceptance
Transitioning
Release and
…. CONT’D
PMI Phases Stages COBIT Process with Process ID ISO Process
Monitoring and Control
Risk Management
BAI01 – Manage Programmes and
Projects
Issue Management BAI06 – Manage Changes Change Management
Change
Management
BAI06 – Manage Changes
Change Management
Reporting
MEA01 – Monitor, Evaluate and
Assess Performance and
Conformance
Service Reporting
Vendor
Management
APO10 – Manage Suppliers Supplier Management
DSS01 – Manage Operations
Capacity Management
Service Continuity and
Availability
Configuration
Management
Resource
Management
APO07 – Manage Human
Resources
Resource
APO06 – Manage Budget and
Costs
Budgeting and
Accounting
MAPPING OF ISO 27001 & ISO 20000
ISO 27001:2013 ISO 20000-1:2011
A.12.1.2 Change Management Change Management
A.12.1.3 Capacity Management Capacity Management
A.12.3 Information Backup Service Continuity and Availability
A.15 Supplier Relationships Supplier Management
A.16 Information security incident management Incident & Service Request Management
A.16.1.6 Learning from information security incidents Problem Management
UNIFIED DOCUMENTATION
ISO 20000-1:2011 ISO 27001:2013
--- 4.1 Understanding of the organization and its context
---
4.2 Understanding the needs and expectations of interested
parties
4.0 SMS General Requirements 4.4 ISMS Requirements
4.1.1 Management Commitment 5.1 Leadership Commitment
--- 6.1 Actions to address risks and opportunities
4.3 Documentation Management 7.5 Documented Information
4.4 Resource Management
7.1 Resources
7.2 Competence
7.3 Awareness
…. CONT’D
ISO 20000-1:2011 ISO 27001:2013
--- 8.1 Operational Planning and Control
---
8.2 Information security risk assessment
8.3 Information security risk treatment
--- 9.1 Monitoring, measurement, analysis and evaluation
4.5.4.2 Internal Audit 9.2 Internal Audit
4.5.4.3 Management Review 9.3 Management Review
4.5.5 Maintain and Improve the SMS (Act) 10 Improvement
IN SCOPE OF ITIL, ISO 20000 AND PROJECT
MANAGEMENT
THANK YOU
?
+971-55-1862974
sh.adnan.ahmed@live.com
ae.linkedin.com/in/adnanahmed16/en
ShAdnanAhmed

More Related Content

What's hot

NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ITIL and ISO 20000: Fundamentals and necessary compliance Synergies
ITIL and ISO 20000: Fundamentals and necessary compliance SynergiesITIL and ISO 20000: Fundamentals and necessary compliance Synergies
ITIL and ISO 20000: Fundamentals and necessary compliance SynergiesPECB
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
Sample SOC2 report of a security audit firm
Sample SOC2 report of a security audit firmSample SOC2 report of a security audit firm
Sample SOC2 report of a security audit firmJosephKirkpatrickCPA
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPECB
 

What's hot (20)

NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Iso 20000 presentation
Iso 20000 presentationIso 20000 presentation
Iso 20000 presentation
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
ITIL and ISO 20000: Fundamentals and necessary compliance Synergies
ITIL and ISO 20000: Fundamentals and necessary compliance SynergiesITIL and ISO 20000: Fundamentals and necessary compliance Synergies
ITIL and ISO 20000: Fundamentals and necessary compliance Synergies
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
Sample SOC2 report of a security audit firm
Sample SOC2 report of a security audit firmSample SOC2 report of a security audit firm
Sample SOC2 report of a security audit firm
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 

Similar to Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Practical

COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF aqel aqel
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB
 
Cobi t 4.1-brochure
Cobi t 4.1-brochureCobi t 4.1-brochure
Cobi t 4.1-brochureDeloitte
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introductionaqel aqel
 
Isaca presentation
Isaca presentationIsaca presentation
Isaca presentationmangsur_ali
 
Rethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformationRethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformationJudy Breedlove
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance FrameworkSherri Booher
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...360 BSI
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Trainingvyomlabs
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyJohn Halliday
 
Allstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -FinalAllstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -FinalCathy Kirch
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013Mike Wright
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information SecurityJohnHPazEMCPMPITIL5G
 
Benefits of Implementing ISO 20000 within your Organization
 Benefits of Implementing ISO 20000 within your Organization Benefits of Implementing ISO 20000 within your Organization
Benefits of Implementing ISO 20000 within your OrganizationPECB
 

Similar to Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Practical (20)

Co5bit
Co5bitCo5bit
Co5bit
 
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Cobi t 4.1-brochure
Cobi t 4.1-brochureCobi t 4.1-brochure
Cobi t 4.1-brochure
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introduction
 
Isaca presentation
Isaca presentationIsaca presentation
Isaca presentation
 
Rethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformationRethinking business decisions and processes for digital transformation
Rethinking business decisions and processes for digital transformation
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
 
How to pass cobit exam
How to pass cobit exam   How to pass cobit exam
How to pass cobit exam
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
 
Allstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -FinalAllstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -Final
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Cobit 4.1 indri
Cobit 4.1 indriCobit 4.1 indri
Cobit 4.1 indri
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 
Benefits of Implementing ISO 20000 within your Organization
 Benefits of Implementing ISO 20000 within your Organization Benefits of Implementing ISO 20000 within your Organization
Benefits of Implementing ISO 20000 within your Organization
 

More from PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 
ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?PECB
 

More from PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 
ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Practical

  • 1.
  • 2. Hafiz Sheikh Adnan Ahmed IT SECURITY & GRC CONSULTANT & INTERNAL AUDITOR He is an IT GRC, Security Consultant and Lead Auditor and a PECB Certified Trainer with over 11 years of significant, progressive experience in Information Technology field, focusing on Information Security, IT Governance, ISO Standards Implementation & Compliance, IT Service Management, Risk Management, Information Security & IT Service Management Audits, Software Project Management and Process Improvement. He has been awarded with ISACA COBIT Certified Assessor by ISACA; only the 92nd worldwide and 8th in UAE. He has been awarded with Security Advisor Middle East Awards 2016 in the category of “Personal Contribution to IT Security” Contact Information +971-55-1862974 sh.adnan.ahmed@live.com ae.linkedin.com/in/adnanahmed16/en ShAdnanAhmed
  • 3. AGENDA • CIA – The Core of Information Security • Myths about ISO 27001, ISO 20000, Project Management • Understanding the Structure of New ISO Management System Requirements • About COBIT 5 • High-Level Mapping of COBIT 5 to the new Management System’s Requirements • Mapping of PMI Phases with COBIT 5 • Mapping of ISO 27001 and ISO 20000 • In Scope of ITIL, ISO 20000 and Project Management
  • 4. PRE-REQUISITES • Understanding of Information Security and ISO Frameworks • Understanding of Project Management • Knowledge of COBIT 5
  • 5. MORNING NIGHTMARE - WHAT CAN GO WRONG? You're a new project manager, a bad week might go something like this: • You open your email and see that one of your team member has inadvertently forwarded a project business case to a competitor of your client. • You’re planning for soft launch of new system before Going Live next week but then you realize your inventory spreadsheet is corrupted. • You’re about to walk into a meeting with your project sponsor and discover the laptop where you’ve stored the presentation you’ve been working on for three days has blue screened. • Courier has misplaced confidential document sent by the Vendor which may jeopardize the whole project schedule and current insurance policy does not cover such loss
  • 6. CIA – THE CORE OF INFORMATION SECURITY • The job of Information Security is primarily to ensure CIA in place but there is a common misconception that only IT is responsible for it. But they're not!! Then who is responsible for Information Security in your organization or say for the project you're managing, particularly for the project related to IT services being provided to the end user
  • 7.
  • 8. • Confidentiality means only authorized persons are able to see actual information and protect actual information from being visible to all others • Integrity is focused to keep information intact as intended and not altered and must not allow unauthorized modification • Availability is to ensure all authorized persons are able to access information when required • While it's not part of CIA, but Non-Repudiation is very significant especially in term of regulator and legal issues. It's the assurance mechanism that sender or receiver can’t deny after transmission
  • 9. Let's think of below : • Who is the information owner in the organization for a project? • Who is to understand and conduct impact assessment? • How to secure information flow/process in your project? • PM is the one who:
  • 10. • Should understand what are information risk concerning his/her project • Interpret impact to senior management and customer for security issues • Need to be able to decide on appropriate mitigating action • Minimize the risk associated with information security threats/breaches. • Include security considerations is integrated in every phase and process of a project; and • Ensure adherence to policy and standard/compliance • So need to include Information Security within the project process right from the initiation
  • 11. 5 GREATEST MYTHS ABOUT ISO 27001 • “The standard requires…” • “We’ll let the IT department handle it” • “We’ll implement it in a few months” • “This standard is all about documentation” • “The only benefit of the standard is for marketing purposes”
  • 12. ISO/IEC 20000 – MYTHS AND TRUTHS • Myth 1 – ISO/IEC 20000 is only for large commercial organizations • Myth 2 – ISO/IEC 20000 is only applicable to IT infrastructure • Myth 3 – ISO/IEC 20000 is of no value to internal service providers • Myth 4 – Service providers must use ITIL® as the underlying framework because ISO/IEC 20000 is based on ITIL • Myth 5 – ISO/IEC 20000 will make my service management slow, more costly and bureaucratic
  • 13. TOP 5 MYTHS IN PROJECT MANAGEMENT • Facts and figures are more important than feelings and perceptions • Project managers need to be detail oriented and not strategic in nature • Rely on the experts in everything that you do • All the battles have to be fought and won so that we can succeed • Project managers cannot be effective in their role unless they have specific technical expertise in the given field that the project is within
  • 14. UNDERSTANDING THE STRUCTURE OF NEW ISO MANAGEMENT SYSTEM REQUIREMENTS
  • 15. ABOUT COBIT 5 • COBIT, developed by ISACA, is a comprehensive IT Governance and Management Framework accepted globally that deals with every aspect of IT and is the only framework that addresses the complete life cycle of IT Investment • Often viewed as the umbrella framework as it integrates all of the main global IT standards • Enables companies to improve IT Governance and Management by ensuring that appropriate process, governance and management enablers are used to build IT capabilities to achieve stakeholder goals • Provides end-to-end business view that integrates other standards, frameworks and guidelines, such as ITIL, ISO 27001, ISO 20000, ISO 31000 and Project Management, into an overall enterprise governance and management framework
  • 16. • COBIT 5 doesn’t replace these other sources of reference. Instead, it is an overarching umbrella framework that helps them all fit together.
  • 17.
  • 18. HIGH-LEVEL MAPPING OF COBIT 5 TO THE NEW MANAGEMENT SYSTEM’S REQUIREMENTS Clause No. Management System Requirements COBIT 5 Guidance 4 4. Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of interested parties 4.3 Determining the scope of the information security and service management systems 4.4 ISO 27001 and ISO 20000 management systems Pain points, trigger events, stakeholder drivers, enterprise goals, IT-related goals and information on related guidance 5 5. Leadership 5.1 Leadership and commitment 5.2 Policy 5.3 Organization roles, responsibilities and authorities Responsible, Accountable, Consulted and (RACI) chart from EDM 01-05 processes RACI chart from APO 06, APO 08, APO 09, APO APO 12, APO 13, BAI 04, BAI 06, BAI 07, BAI 09, 10, DSS 01, DSS 02, DSS 03, DSS 04, DSS 05 Framework Principle and Policies—Appendix G, COBIT 5 Framework 6 6. Planning 6.1 Actions to address risk and opportunities 6.2 ISO 27001 and ISO 20000 objectives and planning to achieve them Management practices from APO 06, APO 08, 09, APO 10, APO 12, APO 13, BAI 04, BAI 06, BAI BAI 09, BAI 10, DSS 01, DSS 02, DSS 03, DSS 04, DSS 05
  • 19. …. CONT’D Clause No. Management System Requirements COBIT 5 Guidance 7 7. Support 7.1 Resources 7.2 Competence 7.3 Awareness 7.4 Communication 7.5 Documented information 7.5.1 General 7.5.2 Creating and updating 7.5.3 Control of documented Enabler: People, Skills and Competencies 8 8. Operation 8.1 Operational planning and control BAI 05 9 9. Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal audit 9.3 Management review Lag and lead indicators EDM 05, MEA 01, MEA 02, MEA 03 10 10. Improvement 10.1 Nonconformity and corrective action MEA 01, MEA 02, MEA 03, Process goals and metrics
  • 20. MAPPING OF PMI PHASES WITH COBIT 5.0 & ISO PROCESSES PMI Phases Stages COBIT Process with Process ID ISO Process Initiation Project Preparation APO05 – Manage Portfolio Business Relationship Management Governance of Process EDM02 – Ensure Benefits Delivery Planning Project Planning BAI01 – Manage Programmes and Projects BAI02 – Manage Requirements Service Level Management Business Blueprint BAI03 – Manage Solutions Identification and Build Design and Transition of new or changed Execution Realization BAI03 – Manage Solutions Identification and Build Design and Transition of new or changed Final Preparation BAI07 – Manage Change Acceptance Transitioning Release and Go Live and BAI07 – Manage Change Acceptance Transitioning Release and
  • 21. …. CONT’D PMI Phases Stages COBIT Process with Process ID ISO Process Monitoring and Control Risk Management BAI01 – Manage Programmes and Projects Issue Management BAI06 – Manage Changes Change Management Change Management BAI06 – Manage Changes Change Management Reporting MEA01 – Monitor, Evaluate and Assess Performance and Conformance Service Reporting Vendor Management APO10 – Manage Suppliers Supplier Management DSS01 – Manage Operations Capacity Management Service Continuity and Availability Configuration Management Resource Management APO07 – Manage Human Resources Resource APO06 – Manage Budget and Costs Budgeting and Accounting
  • 22. MAPPING OF ISO 27001 & ISO 20000 ISO 27001:2013 ISO 20000-1:2011 A.12.1.2 Change Management Change Management A.12.1.3 Capacity Management Capacity Management A.12.3 Information Backup Service Continuity and Availability A.15 Supplier Relationships Supplier Management A.16 Information security incident management Incident & Service Request Management A.16.1.6 Learning from information security incidents Problem Management
  • 23. UNIFIED DOCUMENTATION ISO 20000-1:2011 ISO 27001:2013 --- 4.1 Understanding of the organization and its context --- 4.2 Understanding the needs and expectations of interested parties 4.0 SMS General Requirements 4.4 ISMS Requirements 4.1.1 Management Commitment 5.1 Leadership Commitment --- 6.1 Actions to address risks and opportunities 4.3 Documentation Management 7.5 Documented Information 4.4 Resource Management 7.1 Resources 7.2 Competence 7.3 Awareness
  • 24. …. CONT’D ISO 20000-1:2011 ISO 27001:2013 --- 8.1 Operational Planning and Control --- 8.2 Information security risk assessment 8.3 Information security risk treatment --- 9.1 Monitoring, measurement, analysis and evaluation 4.5.4.2 Internal Audit 9.2 Internal Audit 4.5.4.3 Management Review 9.3 Management Review 4.5.5 Maintain and Improve the SMS (Act) 10 Improvement
  • 25. IN SCOPE OF ITIL, ISO 20000 AND PROJECT MANAGEMENT
  • 26.