SlideShare a Scribd company logo
Techserv


     ISO 27001


Executive Brief




                                       ISO 27001
                                   IT / IS SECURITY


                                Our Approach
                  Ownership . Practical . Effective




                                   “Promoting Systems Integrity”
Effective information security systems incorporate a
range of policies, security products, technologies and      “If you think technology can
procedures. Software applications which provide            solve your security problems,
firewall information security and virus scanners are not   then you don't understand the
enough on their own to protect information. A set of           problems and you don't
procedures and systems needs to be applied to
                                                            understand the technology.”
effectively deter unauthorized access to information
assets.

Companies face threats to their employees, systems,        “Security must begin at the top
operations, and information every day. These threats          of an organization. It is a
include computer viruses, network attacks, fraud,
                                                           leadership issue, and the chief
industrial espionage, and even natural disasters.
                                                               executive must set the
                                                           example. — heard at a security
                                                                    conference”


                                                           “One of the tests of leadership
                                                            is the ability to recognize a
     10 questions to sensitize                             problem before it becomes an
                                                                    emergency”
       the IT / IS Security …

1. Does anyone in the management identify the disgruntled employee before he does
   any harm to company’s business?

2. Does management aware what is the current exposure on information security?

3. Would people recognize a security incident when they saw one? Would they ignore
   it? Would they know what to do about it?

4. Does anyone know how many computers the company owns? Would management
   know if some went missing?

5. Does anyone know how many people are using the organization’s systems? Does
   anybody care whether they are allowed or not, or what they are doing?

6. Did the company suffer from the latest virus attack? How many did it have last year?

7. What are the most critical information assets of the enterprise? Does management
   know where the enterprise is most vulnerable?

8. Is management concerned that company confidential information can be leaked?

9. Has the organization ever had its network security checked by a third party?

10. Is IT security a regular agenda item on IT management meetings?
Techserv is absolutely committed to helping people and
  organizations grow and succeed. Guided by our fundamental
  belief of integrity and professionalism, we promise a best
  client experience. By applying our rich expertise and our
I focused methodologies, we will provide honest advice to help
  you reach your business objectives and transform challenges
  into new possibilities.


   OUR IT SECURITY ASSURANCE APPROACH IS DRIVEN BY …..

                                                                                                  LAWS &
    BUSINESS GOALS                                    COBIT
                                                                                                REGULATIONS



                                                     ISO 27001



      Effectiveness     Deals with information being relevant and pertinent to the business process as well as being
                        delivered in a timely, correct, consistent and usable manner.



        Efficiency      Concerns the provision of information through the optimal (most productive and economical)
                        use of resources.



      Confidentiality   Concerns the protection of sensitive information from unauthorized disclosure.




         Integrity      Relates to the accuracy and completeness of information as well as to its validity in
                        accordance with business values and expectations.



       Availability     Relates to information being available when required by the business process now and in the
                        future. It also concerns the safeguarding of necessary resources and associated capabilities.



       Compliance       Deals with complying with the laws, regulations and contractual arrangements to which the
                        business process is subject, i.e., externally imposed business criteria as well as internal
                        policies.


        Reliability     relates to the provision of appropriate information for management to operate the entity and
                        exercise its fiduciary and governance responsibilities.
TECHSERV’S IT SECURITY METHODOLOGY ….




          IT/IS GOVERNANCE          PROPOSAL         AWARENESS          PLAN          PROJECT
           NEEDS                                                     PROGRAMME        KICK-OFF




                       ENVISION                         RISK                           IDENTIFY
                       SOLUTION                                     ARCHITECTURE
                                                     ASSESSMENT                       CONTROLS




                                  DESIGN                               DESIGN          DESIGN
                                  CONTROLS                            PLANNING        CONTROLS




                                     IMPLEMENT
                                                     TRAINNING       IMPLEMENT          AUDIT
                                      SOLUTION




                                                 OPERATIONLIZE
                                                 SOLUTION           IMPROVEMENTS      MEASURE




                                                           Arul nambi
                                                           Cell +91 9892504538
                                                           Tel. 91 – 22 – 28573170
                                                           E-MAIL : aruln@techservconsult.com
                                                           www.techservconsult.com
“Promoting Systems Integrity”

More Related Content

What's hot

ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
Ahmed Riad .
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
Operational Excellence Consulting
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
Naresh Rao
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
scttmcvy
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
Dr Madhu Aman Sharma
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
HasnolAhmad2
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
ControlCase
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
Julia Urbina-Pineda
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
foram74
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
SerkanRafetHalil1
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
Mart Rovers
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
Hernan Huwyler, MBA CPA
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
ControlCase
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
Craig Willetts ISO Expert
 

What's hot (20)

ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Isms
IsmsIsms
Isms
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 

Viewers also liked

IT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTINGIT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTING
Arul Nambi
 
IT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCINGIT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCING
Arul Nambi
 
Governance consulting for small and medium enterprise growth oriented companies
Governance consulting for small and medium enterprise growth oriented companiesGovernance consulting for small and medium enterprise growth oriented companies
Governance consulting for small and medium enterprise growth oriented companies
Buckley Mortgage Broker - Mortgage Wellness
 
It governance product
It governance productIt governance product
It governance product
Arul Nambi
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
ISO/I20000 in a nutshell
ISO/I20000 in a nutshellISO/I20000 in a nutshell
ISO/I20000 in a nutshellCaroline Mouton
 
Smart PPT Presentation
Smart PPT PresentationSmart PPT Presentation
Smart PPT Presentation
dwellard
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000
Ana Meskovska
 
ISO 9001 IMPLEMENTATION METHODOLOGY
ISO 9001 IMPLEMENTATION METHODOLOGYISO 9001 IMPLEMENTATION METHODOLOGY
ISO 9001 IMPLEMENTATION METHODOLOGY
Arul Nambi
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementationIITSW Company
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
SriramITISConsultant
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
Uppala Anand
 
Introduction to ISO 9001:2015
Introduction to ISO 9001:2015Introduction to ISO 9001:2015

Viewers also liked (14)

IT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTINGIT GOVERNANCE CONSULTING
IT GOVERNANCE CONSULTING
 
IT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCINGIT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCING
 
Governance consulting for small and medium enterprise growth oriented companies
Governance consulting for small and medium enterprise growth oriented companiesGovernance consulting for small and medium enterprise growth oriented companies
Governance consulting for small and medium enterprise growth oriented companies
 
It governance product
It governance productIt governance product
It governance product
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
ISO/I20000 in a nutshell
ISO/I20000 in a nutshellISO/I20000 in a nutshell
ISO/I20000 in a nutshell
 
Smart PPT Presentation
Smart PPT PresentationSmart PPT Presentation
Smart PPT Presentation
 
Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000Experience from Implementation of ISO 20000
Experience from Implementation of ISO 20000
 
ISO 9001 IMPLEMENTATION METHODOLOGY
ISO 9001 IMPLEMENTATION METHODOLOGYISO 9001 IMPLEMENTATION METHODOLOGY
ISO 9001 IMPLEMENTATION METHODOLOGY
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementation
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Introduction to ISO 9001:2015
Introduction to ISO 9001:2015Introduction to ISO 9001:2015
Introduction to ISO 9001:2015
 

Similar to ISO 27001 - IMPLEMENTATION CONSULTING

Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
Nalneesh Gaur
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
Seccuris Inc.
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
mageeb
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
guest8a430d
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
James McDonald
 
IT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product SolutionIT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product SolutionArul Nambi
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
wardell henley
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA security
kesavars
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliancerhanna11
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controlsInterop
 
IT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCINGIT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCINGArul Nambi
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostGuardEra Access Solutions, Inc.
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2Carl Booth
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
UBM_Design_Central
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
UBM_Design_Central
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
Elke Couto Morgado
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 

Similar to ISO 27001 - IMPLEMENTATION CONSULTING (20)

Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
IT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product SolutionIT Governance Assessment / Audit - Product Solution
IT Governance Assessment / Audit - Product Solution
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controls
 
IT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCINGIT GOVERNANCE OFFSHORING / OUTSOURCING
IT GOVERNANCE OFFSHORING / OUTSOURCING
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 

More from Arul Nambi

Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate PresentationArul Nambi
 
PRODUCT DEVELOPMENT METHODOLOGY
PRODUCT DEVELOPMENT METHODOLOGYPRODUCT DEVELOPMENT METHODOLOGY
PRODUCT DEVELOPMENT METHODOLOGYArul Nambi
 
QUALITY AUDITORS TRAINING
QUALITY AUDITORS TRAININGQUALITY AUDITORS TRAINING
QUALITY AUDITORS TRAINING
Arul Nambi
 
IT PROJECT MANAGEMENT TRAINING
IT PROJECT MANAGEMENT TRAININGIT PROJECT MANAGEMENT TRAINING
IT PROJECT MANAGEMENT TRAINING
Arul Nambi
 
PROCESS DOCUMENTATION
PROCESS DOCUMENTATIONPROCESS DOCUMENTATION
PROCESS DOCUMENTATION
Arul Nambi
 
OUTSOURCING ASSURANCE
OUTSOURCING ASSURANCEOUTSOURCING ASSURANCE
OUTSOURCING ASSURANCE
Arul Nambi
 
IT AUDITORS TRAINING
IT AUDITORS TRAININGIT AUDITORS TRAINING
IT AUDITORS TRAINING
Arul Nambi
 
ISO 9001 CONSULTING
ISO 9001 CONSULTINGISO 9001 CONSULTING
ISO 9001 CONSULTING
Arul Nambi
 
CMMI CONSULTING
CMMI CONSULTINGCMMI CONSULTING
CMMI CONSULTING
Arul Nambi
 
SYSTEMS AUDIT
SYSTEMS AUDITSYSTEMS AUDIT
SYSTEMS AUDIT
Arul Nambi
 
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORKSOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
Arul Nambi
 
CMMI CONSULTING
CMMI CONSULTINGCMMI CONSULTING
CMMI CONSULTING
Arul Nambi
 
IT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCEIT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCE
Arul Nambi
 
ASSURANCE
ASSURANCEASSURANCE
ASSURANCE
Arul Nambi
 
SAMPLE PROCESS - TEMPLATE
SAMPLE PROCESS - TEMPLATESAMPLE PROCESS - TEMPLATE
SAMPLE PROCESS - TEMPLATE
Arul Nambi
 
IT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCEIT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCE
Arul Nambi
 
INDEPEDENT OUTSOURCING ASSURANCE
INDEPEDENT OUTSOURCING ASSURANCEINDEPEDENT OUTSOURCING ASSURANCE
INDEPEDENT OUTSOURCING ASSURANCE
Arul Nambi
 

More from Arul Nambi (17)

Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
PRODUCT DEVELOPMENT METHODOLOGY
PRODUCT DEVELOPMENT METHODOLOGYPRODUCT DEVELOPMENT METHODOLOGY
PRODUCT DEVELOPMENT METHODOLOGY
 
QUALITY AUDITORS TRAINING
QUALITY AUDITORS TRAININGQUALITY AUDITORS TRAINING
QUALITY AUDITORS TRAINING
 
IT PROJECT MANAGEMENT TRAINING
IT PROJECT MANAGEMENT TRAININGIT PROJECT MANAGEMENT TRAINING
IT PROJECT MANAGEMENT TRAINING
 
PROCESS DOCUMENTATION
PROCESS DOCUMENTATIONPROCESS DOCUMENTATION
PROCESS DOCUMENTATION
 
OUTSOURCING ASSURANCE
OUTSOURCING ASSURANCEOUTSOURCING ASSURANCE
OUTSOURCING ASSURANCE
 
IT AUDITORS TRAINING
IT AUDITORS TRAININGIT AUDITORS TRAINING
IT AUDITORS TRAINING
 
ISO 9001 CONSULTING
ISO 9001 CONSULTINGISO 9001 CONSULTING
ISO 9001 CONSULTING
 
CMMI CONSULTING
CMMI CONSULTINGCMMI CONSULTING
CMMI CONSULTING
 
SYSTEMS AUDIT
SYSTEMS AUDITSYSTEMS AUDIT
SYSTEMS AUDIT
 
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORKSOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
SOFTWARE PRODUCT DEVELOPMENT GOVERNANCE FRAMEWORK
 
CMMI CONSULTING
CMMI CONSULTINGCMMI CONSULTING
CMMI CONSULTING
 
IT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCEIT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCE
 
ASSURANCE
ASSURANCEASSURANCE
ASSURANCE
 
SAMPLE PROCESS - TEMPLATE
SAMPLE PROCESS - TEMPLATESAMPLE PROCESS - TEMPLATE
SAMPLE PROCESS - TEMPLATE
 
IT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCEIT OUTSOURCING ASSURANCE
IT OUTSOURCING ASSURANCE
 
INDEPEDENT OUTSOURCING ASSURANCE
INDEPEDENT OUTSOURCING ASSURANCEINDEPEDENT OUTSOURCING ASSURANCE
INDEPEDENT OUTSOURCING ASSURANCE
 

Recently uploaded

falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 

Recently uploaded (20)

falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 

ISO 27001 - IMPLEMENTATION CONSULTING

  • 1. Techserv ISO 27001 Executive Brief ISO 27001 IT / IS SECURITY Our Approach Ownership . Practical . Effective “Promoting Systems Integrity”
  • 2. Effective information security systems incorporate a range of policies, security products, technologies and “If you think technology can procedures. Software applications which provide solve your security problems, firewall information security and virus scanners are not then you don't understand the enough on their own to protect information. A set of problems and you don't procedures and systems needs to be applied to understand the technology.” effectively deter unauthorized access to information assets. Companies face threats to their employees, systems, “Security must begin at the top operations, and information every day. These threats of an organization. It is a include computer viruses, network attacks, fraud, leadership issue, and the chief industrial espionage, and even natural disasters. executive must set the example. — heard at a security conference” “One of the tests of leadership is the ability to recognize a 10 questions to sensitize problem before it becomes an emergency” the IT / IS Security … 1. Does anyone in the management identify the disgruntled employee before he does any harm to company’s business? 2. Does management aware what is the current exposure on information security? 3. Would people recognize a security incident when they saw one? Would they ignore it? Would they know what to do about it? 4. Does anyone know how many computers the company owns? Would management know if some went missing? 5. Does anyone know how many people are using the organization’s systems? Does anybody care whether they are allowed or not, or what they are doing? 6. Did the company suffer from the latest virus attack? How many did it have last year? 7. What are the most critical information assets of the enterprise? Does management know where the enterprise is most vulnerable? 8. Is management concerned that company confidential information can be leaked? 9. Has the organization ever had its network security checked by a third party? 10. Is IT security a regular agenda item on IT management meetings?
  • 3. Techserv is absolutely committed to helping people and organizations grow and succeed. Guided by our fundamental belief of integrity and professionalism, we promise a best client experience. By applying our rich expertise and our I focused methodologies, we will provide honest advice to help you reach your business objectives and transform challenges into new possibilities. OUR IT SECURITY ASSURANCE APPROACH IS DRIVEN BY ….. LAWS & BUSINESS GOALS COBIT REGULATIONS ISO 27001 Effectiveness Deals with information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent and usable manner. Efficiency Concerns the provision of information through the optimal (most productive and economical) use of resources. Confidentiality Concerns the protection of sensitive information from unauthorized disclosure. Integrity Relates to the accuracy and completeness of information as well as to its validity in accordance with business values and expectations. Availability Relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities. Compliance Deals with complying with the laws, regulations and contractual arrangements to which the business process is subject, i.e., externally imposed business criteria as well as internal policies. Reliability relates to the provision of appropriate information for management to operate the entity and exercise its fiduciary and governance responsibilities.
  • 4. TECHSERV’S IT SECURITY METHODOLOGY …. IT/IS GOVERNANCE PROPOSAL AWARENESS PLAN PROJECT NEEDS PROGRAMME KICK-OFF ENVISION RISK IDENTIFY SOLUTION ARCHITECTURE ASSESSMENT CONTROLS DESIGN DESIGN DESIGN CONTROLS PLANNING CONTROLS IMPLEMENT TRAINNING IMPLEMENT AUDIT SOLUTION OPERATIONLIZE SOLUTION IMPROVEMENTS MEASURE Arul nambi Cell +91 9892504538 Tel. 91 – 22 – 28573170 E-MAIL : aruln@techservconsult.com www.techservconsult.com “Promoting Systems Integrity”