SlideShare a Scribd company logo
1 of 30
Download to read offline
ISO/IEC 27014:2013 & 38500:2008 
Governance of Information 
Technology 
vs. 
Governance of Information Security 
Hugh H. Penri-Williams 
CFE CIA CCSA CRMA PIIA CISA CISM CGEIT CRISC ITIL-F C31000 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams
Disclaimer! 
Unless indicated otherwise the opinions and 
views expressed in this presentation are 
those of the author alone and do not reflect 
the official policy or position of ISO, AFAI, 
ISACA, ITGI, The IIA, IFACI, Alcatel-Lucent, 
ACFE, S.W.I.F.T. or any other organization. 
Reminder for documents bought from ISO, e.g.: 
Licensed to GLANIAD 1865/HUGH PENRI-WILLIAMS 
Single user licence only, copying and networking prohibited 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 2
Who or What does ISO* represent? 
The International Organization for Standardization consists of the national 
standards institutes of 164 countries (e.g. AFNOR FR, ANSI / NIST US, BSI 
GB, DIN DE) with a Central Secretariat in Geneva CH for coordination. 
ISACA/ITGI has Category A (originally C in 2008) Liaison status within the 
ISO/IEC Joint Technical Committee 1 Information technology: 
ü SubCommittee7 Develops guidance for Software & Systems Engineering 
ü SC27 Develops guidance for IT Security Techniques, including the 
27000 family / series of Security Standards 
ü SC40 Develops guidance for IT Service Management & IT Governance 
ISACA members who are ISO Subject Matter Experts are invited to 
volunteer to participate on future review teams for ISO exposure drafts. 
*Greek for ‘equal’, NOT an acronym! IEC = International Electrotechnical Committee 
also liaisons with other standards bodies like ITU = International Telecommunication Union 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 3
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
4 
ISO/IEC JTC 1/SC 27 Working Groups 
WG1 Information security management systems* 
ü 27000**, 27001, 27002, 27005, etc. 
WG2 Cryptography and security mechanisms 
ü 10116, 18033, 29192, etc. 
WG3 Security evaluation, testing and specification 
ü 15048, 15446, 18045, 29147, etc. 
WG4 Security controls and services* 
ü 27033, 27035, 27036, 27040, 27050, etc. 
WG5 Identity management and privacy technologies 
ü 24745, 24760, 29100**, 29190, etc. 
*ISACA Liaison Representatives participate **available FREE of charge on ISO website
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
5 
The ISO Process Cycle 
Ø Study Period 
Ø New Work Item Proposal 
Ø Working Drafts (1st, 2nd,…) 
Ø Committee Drafts (1st, 2nd,…) 
Ø Final Committee Draft 
Ø Draft International Standard 
Ø Final Draft International Standard 
Ø Publication! 
Subsequently, revisions are foreseen every 5 years (most recently 
it took 8 years for 27001 & 27002!) 
Another route results in publication of a Technical Report (TR nnnnn)
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
6 
ISO/IEC 27014 Development 1/2 
Study Period agreed Kyoto JP April 2008, ‘Call for contributions’ issued July 
2008 (particularly involved early on were Japan & Korea – who then became 
co-editors, CA, ZA, BE, SE & Liaisons: Information Security Forum & ISACA) 
Results presented in Limassol CY Oct. 2008 (situation was touch & go, ISACA 
persuaded WG1 Convenor to call informal meeting on future of ISG) 
NWIP voting results February 2009 32 with 5 Questions of which Q2 “Do 
you support as a NWI” received 28 YES & 4 Abstentions 
Then 3 WDs (during meetings in Beijing CN May & Redmond US Nov. 2009, 
Melaka* MY Apr. & Berlin DE Oct. 2010) before voting on 1st CD Feb. 2011: 
Approval 14 plus with comments 5 = 19, Disapproval 4, Abstention 13! The 
whole project could have nearly failed again at this stage, just like in Cyprus! 
DIS improvements made in Singapore Apr., finalised in Nairobi KE Oct. 2011 
*seriously impacted by absence of European delegations due to Icelandic volcano – used Skype!
ISO/IEC 27014 Development 2/2 
November 2011 DIS voting result 
*P-Members voting: 24 in favour out of 27 = 89 % 
(requirement >= 66.66%) {AU, UK, US} 
Member bodies voting: 3 negative votes out of 35 = 9 % 
(requirement <= 25%) 
FDIS improvements made in Stockholm SE May & in Rome IT Oct. 2012 
November 2012 FDIS voting result 
P-Members voting: 19 in favour out of 20 = 95 % 
(requirement >= 66.66%) {US} 
Member bodies voting: 1 negative vote out of 32 = 3 % 
(requirement <= 25%) 
Finally published May 2013 = 5 year effort for 11 pages! 
*Participating i.e. voting vs. Observing members 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
7
CG Defined (source OECD) 
u involves a set of relationships between an 
organization’s management, its board, its 
shareholders and other stakeholders 
u also provides the structure through which 
the objectives of the company are set, and 
the means of attaining those objectives and 
monitoring performance are determined 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
8
Many other definitions exist but with certain 
common elements, describing governance as 
the policies, processes and structures used by 
an organisation: 
v To direct and control its activities 
v To achieve its objectives 
v To protect the interests of its stakeholders 
v Consistent with appropriate ethical standards 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
9 
Governance
The Responsibilities of the Board 
The board should fulfil certain key functions, including: 
1. Reviewing and guiding corporate strategy, annual budgets and 
business plans; setting performance objectives; monitoring 
corporate performance; and overseeing major capital expenditures, 
acquisitions and divestitures. 
2. Monitoring the effectiveness of the company’s governance and 
risk management practices and making changes as needed 
3. Selecting, compensating, monitoring and, when necessary, 
replacing key executives and overseeing succession planning. 
4. Aligning key executive and board remuneration with the longer 
term interests of the company and its shareholders. 
5. Ensuring the integrity of the organisation’s accounting and financial 
reporting systems; 
6. Ensuring a formal and transparent board nomination and election 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
process. 
10
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
11
Governance does not exist as a set of distinct and separate 
processes and structures. Rather, there are relationships 
among governance, risk management, and internal controls: 
§ Effective governance activities consider risk when setting 
strategy. Conversely, risk management relies on effective 
governance (e.g., tone at the top, risk appetite and tolerance, 
risk culture, and the oversight of risk management). 
§ Effective governance relies on internal controls and 
communication to the board on the effectiveness of those 
controls. 
§ Control and risk also are related, as control is defined as “any 
action taken by management, the board and other parties to 
manage risk and increase the likelihood that established goals 
will be achieved.” 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
12 
Internal Governance Elements
Internal Governance Elements 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
13 
Stakeholders
IT Governance Definition 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
14 
IT Governance is an integral part of enterprise 
governance and consists of the leadership and 
organisational structures and processes that ensure 
that the organisation’s IT sustains and extends the 
organisation’s strategies and objectives. 
IT governance is the responsibility of the board of 
directors and executive management. 
by the IT Governance Institute® 
“Technology is a tool to accomplish 
business, not an end in itself”
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
15 
COBIT: Governance of Enterprise IT
ISACA Contribution to Study Period 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
16
Ideas that were floated 2/2 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
17
Conclusion: ISG must differentiate itself from 
ITG because of Risks from Non-IT factors 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
18
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 19
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 20
Why were they created? 
ISO 38500 1.3 Objectives 
The purpose of this standard is to promote effective, efficient, 
and acceptable use of IT in all organizations by: 
• assuring stakeholders (including consumers, shareholders, 
and employees) that, if the standard is followed, they can 
have confidence in the organization’s corporate governance of 
IT; 
• informing and guiding directors in governing the use of IT in 
their organization; and 
• providing a basis for objective evaluation of the corporate 
governance of IT. 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
21
Why were they created? 
ISO 27014 4.1 General 
Governance of information security needs to align objectives and 
strategies for information security with business objectives and 
strategies, and requires compliance with legislation, regulations 
and contracts. It should be assessed, analysed and implemented 
through a risk management approach, supported by an internal 
control system. 
The governing body is ultimately accountable for an organisation’s 
decisions and the performance of the organisation. In respect to 
information security, the key focus of the governing body is to 
ensure that the organisation’s approach to information security is 
efficient, effective, acceptable and in line with business objectives 
and strategies giving due regard to stakeholder expectations. 
Various stakeholders can have different values and needs. 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
22
What do they have in common? 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 23
ISO 38500 ISO 27014 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
24
What distinguishes them from each other? 
38500 fast tracked from AS8015; 27014 completely new! 
Only one mention in 38500 of ‘security’, namely as a bullet 
under 1.4.2 in respect of breaches: security standards! 
38500 only refers to ISO Guide 73:2002 because revised 
Guide & ISO 31000 only published in 2009! 
27014 refers to new Guide 73 & ISO 31000 plus 27005 and 
ITGI’s Security Governance Framework, and, of course to 
38500 itself! 
27014 gives examples in Annex of IS summary & detailed 
status reports; 38500 has none. 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 25
What distinguishes them from each other? 
ISO 38500 Principles* 
1: Responsibility 
2: Strategy 
3: Acquisition 
4: Performance 
5: Conformance 
6: Human Behaviour 
ISO 27014 5.2 Principles** 
1 Establish organisation-wide 
information security 
2 Adopt a risk-based approach 
3 Set the direction of 
investment decisions 
4 Ensure conformance with 
internal and external 
requirements 
5 Foster a security-positive 
environment 
6 Review performance in 
relation to business outcomes 
* Mere headings vs. 
** action-oriented 
statements! 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 26
Resources (1/3) 
GTAG-­‐15 
Informa/on 
Security 
Governance 
§ What 
is 
Informa/on 
Security 
Governance? 
§ Why 
Should 
the 
CAE 
Be 
Concerned 
About 
Informa/on 
Security 
Governance? 
§ The 
Internal 
Audit 
Ac/vity’s 
Role 
in 
Informa/on 
Security 
Governance 
§ The 
Internal 
Audit 
Ac/vity’s 
Responsibili/es 
Related 
to 
Informa/on 
Security 
Governance 
§ Audi/ng 
Informa/on 
Security 
Governance 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
27
Resources (2/3) 
GTAG-­‐17 
Audi/ng 
IT 
Governance 
Some 
of 
the 
key 
areas 
of 
IT 
governance 
internal 
auditors 
should 
address 
are: 
§ Chief 
IT 
Officer 
(e.g. 
Chief 
Informa/on 
Officer; 
Chief 
Technology 
Officer; 
Chief 
Informa/on 
Security 
Officer) 
related 
roles 
and 
responsibili/es. 
§ Accountability 
and 
decision-­‐making. 
§ IT 
performance 
monitoring 
and 
repor/ng 
metrics, 
including 
financial 
management 
of 
IT 
opera/ons 
and 
projects. 
§ CxO4 
level 
of 
understanding 
of 
how 
IT 
supports 
and 
enables 
the 
achievement 
of 
the 
organiza/on’s 
strategy 
and 
objec/ves. 
§ Alignment 
between 
IT 
and 
the 
organiza/on. 
§ IT 
governance 
risks 
and 
controls. 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
28
Information technology is the 
Elephant in the Room – especially 
the boardroom. Organizations depend 
on it for routine operations and future 
performance, and IT problems can 
have serious consequences. 
Yet many organizations lack effective 
oversight of IT, and are at risk of 
surprises. This book aims to help 
build shared understanding that leads 
to a well-integrated system for 
governance of IT from the boardroom 
to the coalface, framed around the 
guidance in ISO/IEC 38500. 
Resources (3/3) 
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 
29 
by 
Mark 
Toomey 
also author of The Infonomics Letter (free)
ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 30 
A 
nnex 
I 
Bibliography FR 
Cadre de référence international des pratiques professionnelles 
de l’audit interne [CRIPP] / IIA, IFACI trad. – 2013 
IT Gouvernance / F. Georgel – 2009 
La Gouvernance des Systèmes d’Information / Audit & Contrôle 
internes IFACI N°206 - sept. 2011 
Prise de position IFA/IFACI sur le rôle de l’audit interne dans le 
gouvernement d’entreprise. – IFA ; IFACI – 2009

More Related Content

What's hot

NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesCertification Europe
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
What is iso iec 20000
What is iso iec 20000What is iso iec 20000
What is iso iec 20000Mart Rovers
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introductionaqel aqel
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdfControlCase
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing worldPECB
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementChristian F. Nissen
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...Hernan Huwyler, MBA CPA
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5Eryk Budi Pratama
 

What's hot (20)

NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
What is iso iec 20000
What is iso iec 20000What is iso iec 20000
What is iso iec 20000
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introduction
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Introduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT managementIntroduction to COBIT 5 and IT management
Introduction to COBIT 5 and IT management
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 

Viewers also liked

SNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra YulistiaSNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra Yulistiarahmatmoelyana
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Iso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookIso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookHazel Jennings
 
Uel information strategy development implementation v2-ac
Uel information strategy development  implementation v2-acUel information strategy development  implementation v2-ac
Uel information strategy development implementation v2-acGurdish Sandhu
 
Managing Corporate Information Security Risk in Financial Institutions
Managing Corporate Information Security Risk in Financial InstitutionsManaging Corporate Information Security Risk in Financial Institutions
Managing Corporate Information Security Risk in Financial InstitutionsMark Curphey
 
Marcos de gobierno de ti
Marcos de gobierno de tiMarcos de gobierno de ti
Marcos de gobierno de tiRosmery Banr
 
sertifikasi personil dalam iso 27001-fetri miftach workshop 7 desember
sertifikasi personil dalam iso 27001-fetri miftach workshop 7 desembersertifikasi personil dalam iso 27001-fetri miftach workshop 7 desember
sertifikasi personil dalam iso 27001-fetri miftach workshop 7 desemberdirektoratkaminfo
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsPECB
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Coso Internal Control Integrated Framework
Coso Internal Control Integrated FrameworkCoso Internal Control Integrated Framework
Coso Internal Control Integrated Frameworkhyesue
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!PECB
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Smart Assessment
 

Viewers also liked (20)

Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015
Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015
Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015
 
SNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra YulistiaSNI ISO/IEC 38500 IT Governance - Chandra Yulistia
SNI ISO/IEC 38500 IT Governance - Chandra Yulistia
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
NISO Webinar: RFID Systems in Libraries Part 2: Standards
NISO Webinar: RFID Systems in Libraries Part 2: StandardsNISO Webinar: RFID Systems in Libraries Part 2: Standards
NISO Webinar: RFID Systems in Libraries Part 2: Standards
 
Iso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookIso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbook
 
Uel information strategy development implementation v2-ac
Uel information strategy development  implementation v2-acUel information strategy development  implementation v2-ac
Uel information strategy development implementation v2-ac
 
ISO 38500 Visão Geral
ISO 38500   Visão GeralISO 38500   Visão Geral
ISO 38500 Visão Geral
 
ISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 TopologyISO.IEC_27001-27002-2013 Topology
ISO.IEC_27001-27002-2013 Topology
 
Managing Corporate Information Security Risk in Financial Institutions
Managing Corporate Information Security Risk in Financial InstitutionsManaging Corporate Information Security Risk in Financial Institutions
Managing Corporate Information Security Risk in Financial Institutions
 
Marcos de gobierno de ti
Marcos de gobierno de tiMarcos de gobierno de ti
Marcos de gobierno de ti
 
Understanding governance
Understanding governanceUnderstanding governance
Understanding governance
 
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan tiSosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
 
sertifikasi personil dalam iso 27001-fetri miftach workshop 7 desember
sertifikasi personil dalam iso 27001-fetri miftach workshop 7 desembersertifikasi personil dalam iso 27001-fetri miftach workshop 7 desember
sertifikasi personil dalam iso 27001-fetri miftach workshop 7 desember
 
Initiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business NeedsInitiating IT Governance Strategy to Identify Business Needs
Initiating IT Governance Strategy to Identify Business Needs
 
Coso framework
Coso frameworkCoso framework
Coso framework
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Coso Internal Control Integrated Framework
Coso Internal Control Integrated FrameworkCoso Internal Control Integrated Framework
Coso Internal Control Integrated Framework
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
COBIT 5
COBIT 5COBIT 5
COBIT 5
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
 

Similar to ISO 27014 et 38500

Module program iso 41000 2015
Module program iso 41000 2015Module program iso 41000 2015
Module program iso 41000 2015Ridwan Ibrahim
 
Information and documentation, Records management, Concepts and principles.pptx
Information and documentation, Records management, Concepts and principles.pptxInformation and documentation, Records management, Concepts and principles.pptx
Information and documentation, Records management, Concepts and principles.pptxssuser0d0f881
 
INVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLES
INVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLESINVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLES
INVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLESDAVID CHIKHLADZE
 
ISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISOISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISONQA
 
Kym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 BaltimoreKym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 BaltimoreAllison Wong
 
KH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 BaltimoreKH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 BaltimoreKym Henderson
 
Ready-to-use Documentation for ISO 18788 with Training Kit - Free Demo
Ready-to-use Documentation for ISO 18788 with Training Kit - Free DemoReady-to-use Documentation for ISO 18788 with Training Kit - Free Demo
Ready-to-use Documentation for ISO 18788 with Training Kit - Free DemoGlobal Manager Group
 
ISO 45001 Awarness.ppt
ISO 45001 Awarness.pptISO 45001 Awarness.ppt
ISO 45001 Awarness.pptjohnraj44
 
Chapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxChapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxmccormicknadine86
 
Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation Amit Bhargava
 
Internal audit ( pdf drive )
Internal audit ( pdf drive )Internal audit ( pdf drive )
Internal audit ( pdf drive )TaDo8
 
SS ISO 9004-2018 - Preview (1).pdf
SS ISO 9004-2018 - Preview (1).pdfSS ISO 9004-2018 - Preview (1).pdf
SS ISO 9004-2018 - Preview (1).pdfEuroarTecnologiaAuto
 
COBIT® Presentation Package.ppt
COBIT® Presentation Package.pptCOBIT® Presentation Package.ppt
COBIT® Presentation Package.pptEmmacuet
 
ISO Induction
ISO InductionISO Induction
ISO Inductionlpiper88
 
Understanding ISO 41000 - 2015
Understanding ISO 41000 - 2015Understanding ISO 41000 - 2015
Understanding ISO 41000 - 2015Ridwan Ibrahim
 
ISO+41000-2015+Understanding
ISO+41000-2015+UnderstandingISO+41000-2015+Understanding
ISO+41000-2015+UnderstandingSetiono Winardi
 

Similar to ISO 27014 et 38500 (20)

Changes will save the day
Changes will save the dayChanges will save the day
Changes will save the day
 
Module program iso 41000 2015
Module program iso 41000 2015Module program iso 41000 2015
Module program iso 41000 2015
 
Information and documentation, Records management, Concepts and principles.pptx
Information and documentation, Records management, Concepts and principles.pptxInformation and documentation, Records management, Concepts and principles.pptx
Information and documentation, Records management, Concepts and principles.pptx
 
INVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLES
INVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLESINVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLES
INVESTMENT BANKING VALUATION MODELS - DCF , LBO , COMPARABLES
 
ISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISOISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISO
 
Kym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 BaltimoreKym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
 
KH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 BaltimoreKH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 Baltimore
 
Ready-to-use Documentation for ISO 18788 with Training Kit - Free Demo
Ready-to-use Documentation for ISO 18788 with Training Kit - Free DemoReady-to-use Documentation for ISO 18788 with Training Kit - Free Demo
Ready-to-use Documentation for ISO 18788 with Training Kit - Free Demo
 
ISO 45001 Awarness.ppt
ISO 45001 Awarness.pptISO 45001 Awarness.ppt
ISO 45001 Awarness.ppt
 
Chapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxChapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docx
 
Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation
 
Internal audit ( pdf drive )
Internal audit ( pdf drive )Internal audit ( pdf drive )
Internal audit ( pdf drive )
 
Iso 18788-documents
Iso 18788-documentsIso 18788-documents
Iso 18788-documents
 
SS ISO 9004-2018 - Preview (1).pdf
SS ISO 9004-2018 - Preview (1).pdfSS ISO 9004-2018 - Preview (1).pdf
SS ISO 9004-2018 - Preview (1).pdf
 
SS ISO 9004-2018 - Preview.pdf
SS ISO 9004-2018 - Preview.pdfSS ISO 9004-2018 - Preview.pdf
SS ISO 9004-2018 - Preview.pdf
 
SS ISO 9004-2018 - Preview.pdf
SS ISO 9004-2018 - Preview.pdfSS ISO 9004-2018 - Preview.pdf
SS ISO 9004-2018 - Preview.pdf
 
COBIT® Presentation Package.ppt
COBIT® Presentation Package.pptCOBIT® Presentation Package.ppt
COBIT® Presentation Package.ppt
 
ISO Induction
ISO InductionISO Induction
ISO Induction
 
Understanding ISO 41000 - 2015
Understanding ISO 41000 - 2015Understanding ISO 41000 - 2015
Understanding ISO 41000 - 2015
 
ISO+41000-2015+Understanding
ISO+41000-2015+UnderstandingISO+41000-2015+Understanding
ISO+41000-2015+Understanding
 

More from Antoine Vigneron

L'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécuritéL'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécuritéAntoine Vigneron
 
La signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usagesLa signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usagesAntoine Vigneron
 
La signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDASLa signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDASAntoine Vigneron
 
La signature électronique chez les notaires
La signature électronique chez les notairesLa signature électronique chez les notaires
La signature électronique chez les notairesAntoine Vigneron
 
La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?Antoine Vigneron
 
Internet des objets - Doc@Post
Internet des objets - Doc@PostInternet des objets - Doc@Post
Internet des objets - Doc@PostAntoine Vigneron
 
Objets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendreObjets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendreAntoine Vigneron
 
Données personnelles et SI - GDPR
Données personnelles et SI - GDPRDonnées personnelles et SI - GDPR
Données personnelles et SI - GDPRAntoine Vigneron
 
La transition numérique un des facteurs clé vers une performance globale des...
 La transition numérique un des facteurs clé vers une performance globale des... La transition numérique un des facteurs clé vers une performance globale des...
La transition numérique un des facteurs clé vers une performance globale des...Antoine Vigneron
 
Cybersécurité, IOT automobile et aéronautique
Cybersécurité, IOTautomobile et aéronautiqueCybersécurité, IOTautomobile et aéronautique
Cybersécurité, IOT automobile et aéronautiqueAntoine Vigneron
 
Paiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitalePaiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitaleAntoine Vigneron
 
Les ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussieLes ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussieAntoine Vigneron
 
Relever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en EuropeRelever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en EuropeAntoine Vigneron
 
DSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simpliciteDSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simpliciteAntoine Vigneron
 
CFAO Concilier securité et simplicite
CFAO Concilier securité et simpliciteCFAO Concilier securité et simplicite
CFAO Concilier securité et simpliciteAntoine Vigneron
 
Galtier Concilier securite et simplicite
Galtier Concilier securite et simpliciteGaltier Concilier securite et simplicite
Galtier Concilier securite et simpliciteAntoine Vigneron
 

More from Antoine Vigneron (20)

L'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécuritéL'automatisation au service de la cybersécurité
L'automatisation au service de la cybersécurité
 
La signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usagesLa signature électronique et eIDAS - De nouveaux usages
La signature électronique et eIDAS - De nouveaux usages
 
La signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDASLa signature électronique et les nouveaux services eIDAS
La signature électronique et les nouveaux services eIDAS
 
La signature électronique chez les notaires
La signature électronique chez les notairesLa signature électronique chez les notaires
La signature électronique chez les notaires
 
Bitcoin et le bitcoin
Bitcoin et le bitcoinBitcoin et le bitcoin
Bitcoin et le bitcoin
 
La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?La Blockchain: la fin des tiers de confiance?
La Blockchain: la fin des tiers de confiance?
 
CIO advisory English
CIO advisory English CIO advisory English
CIO advisory English
 
Les objets connectés
Les objets connectésLes objets connectés
Les objets connectés
 
Internet des objets - Doc@Post
Internet des objets - Doc@PostInternet des objets - Doc@Post
Internet des objets - Doc@Post
 
Objets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendreObjets connectés: un 360° pour les comprendre
Objets connectés: un 360° pour les comprendre
 
Données personnelles et SI - GDPR
Données personnelles et SI - GDPRDonnées personnelles et SI - GDPR
Données personnelles et SI - GDPR
 
La transition numérique un des facteurs clé vers une performance globale des...
 La transition numérique un des facteurs clé vers une performance globale des... La transition numérique un des facteurs clé vers une performance globale des...
La transition numérique un des facteurs clé vers une performance globale des...
 
Cybersécurité, IOT automobile et aéronautique
Cybersécurité, IOTautomobile et aéronautiqueCybersécurité, IOTautomobile et aéronautique
Cybersécurité, IOT automobile et aéronautique
 
Paiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitalePaiement mobile et biométrie, deux piliers de la transformation digitale
Paiement mobile et biométrie, deux piliers de la transformation digitale
 
Les ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussieLes ECNi : une transformation numérique réussie
Les ECNi : une transformation numérique réussie
 
Relever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en EuropeRelever le défi SI de la transformation numérique en Europe
Relever le défi SI de la transformation numérique en Europe
 
DSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simpliciteDSBrowser Concilier securité et simplicite
DSBrowser Concilier securité et simplicite
 
CFAO Concilier securité et simplicite
CFAO Concilier securité et simpliciteCFAO Concilier securité et simplicite
CFAO Concilier securité et simplicite
 
Galtier Concilier securite et simplicite
Galtier Concilier securite et simpliciteGaltier Concilier securite et simplicite
Galtier Concilier securite et simplicite
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

ISO 27014 et 38500

  • 1. ISO/IEC 27014:2013 & 38500:2008 Governance of Information Technology vs. Governance of Information Security Hugh H. Penri-Williams CFE CIA CCSA CRMA PIIA CISA CISM CGEIT CRISC ITIL-F C31000 ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams
  • 2. Disclaimer! Unless indicated otherwise the opinions and views expressed in this presentation are those of the author alone and do not reflect the official policy or position of ISO, AFAI, ISACA, ITGI, The IIA, IFACI, Alcatel-Lucent, ACFE, S.W.I.F.T. or any other organization. Reminder for documents bought from ISO, e.g.: Licensed to GLANIAD 1865/HUGH PENRI-WILLIAMS Single user licence only, copying and networking prohibited ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 2
  • 3. Who or What does ISO* represent? The International Organization for Standardization consists of the national standards institutes of 164 countries (e.g. AFNOR FR, ANSI / NIST US, BSI GB, DIN DE) with a Central Secretariat in Geneva CH for coordination. ISACA/ITGI has Category A (originally C in 2008) Liaison status within the ISO/IEC Joint Technical Committee 1 Information technology: ü SubCommittee7 Develops guidance for Software & Systems Engineering ü SC27 Develops guidance for IT Security Techniques, including the 27000 family / series of Security Standards ü SC40 Develops guidance for IT Service Management & IT Governance ISACA members who are ISO Subject Matter Experts are invited to volunteer to participate on future review teams for ISO exposure drafts. *Greek for ‘equal’, NOT an acronym! IEC = International Electrotechnical Committee also liaisons with other standards bodies like ITU = International Telecommunication Union ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 3
  • 4. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 4 ISO/IEC JTC 1/SC 27 Working Groups WG1 Information security management systems* ü 27000**, 27001, 27002, 27005, etc. WG2 Cryptography and security mechanisms ü 10116, 18033, 29192, etc. WG3 Security evaluation, testing and specification ü 15048, 15446, 18045, 29147, etc. WG4 Security controls and services* ü 27033, 27035, 27036, 27040, 27050, etc. WG5 Identity management and privacy technologies ü 24745, 24760, 29100**, 29190, etc. *ISACA Liaison Representatives participate **available FREE of charge on ISO website
  • 5. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 5 The ISO Process Cycle Ø Study Period Ø New Work Item Proposal Ø Working Drafts (1st, 2nd,…) Ø Committee Drafts (1st, 2nd,…) Ø Final Committee Draft Ø Draft International Standard Ø Final Draft International Standard Ø Publication! Subsequently, revisions are foreseen every 5 years (most recently it took 8 years for 27001 & 27002!) Another route results in publication of a Technical Report (TR nnnnn)
  • 6. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 6 ISO/IEC 27014 Development 1/2 Study Period agreed Kyoto JP April 2008, ‘Call for contributions’ issued July 2008 (particularly involved early on were Japan & Korea – who then became co-editors, CA, ZA, BE, SE & Liaisons: Information Security Forum & ISACA) Results presented in Limassol CY Oct. 2008 (situation was touch & go, ISACA persuaded WG1 Convenor to call informal meeting on future of ISG) NWIP voting results February 2009 32 with 5 Questions of which Q2 “Do you support as a NWI” received 28 YES & 4 Abstentions Then 3 WDs (during meetings in Beijing CN May & Redmond US Nov. 2009, Melaka* MY Apr. & Berlin DE Oct. 2010) before voting on 1st CD Feb. 2011: Approval 14 plus with comments 5 = 19, Disapproval 4, Abstention 13! The whole project could have nearly failed again at this stage, just like in Cyprus! DIS improvements made in Singapore Apr., finalised in Nairobi KE Oct. 2011 *seriously impacted by absence of European delegations due to Icelandic volcano – used Skype!
  • 7. ISO/IEC 27014 Development 2/2 November 2011 DIS voting result *P-Members voting: 24 in favour out of 27 = 89 % (requirement >= 66.66%) {AU, UK, US} Member bodies voting: 3 negative votes out of 35 = 9 % (requirement <= 25%) FDIS improvements made in Stockholm SE May & in Rome IT Oct. 2012 November 2012 FDIS voting result P-Members voting: 19 in favour out of 20 = 95 % (requirement >= 66.66%) {US} Member bodies voting: 1 negative vote out of 32 = 3 % (requirement <= 25%) Finally published May 2013 = 5 year effort for 11 pages! *Participating i.e. voting vs. Observing members ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 7
  • 8. CG Defined (source OECD) u involves a set of relationships between an organization’s management, its board, its shareholders and other stakeholders u also provides the structure through which the objectives of the company are set, and the means of attaining those objectives and monitoring performance are determined ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 8
  • 9. Many other definitions exist but with certain common elements, describing governance as the policies, processes and structures used by an organisation: v To direct and control its activities v To achieve its objectives v To protect the interests of its stakeholders v Consistent with appropriate ethical standards ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 9 Governance
  • 10. The Responsibilities of the Board The board should fulfil certain key functions, including: 1. Reviewing and guiding corporate strategy, annual budgets and business plans; setting performance objectives; monitoring corporate performance; and overseeing major capital expenditures, acquisitions and divestitures. 2. Monitoring the effectiveness of the company’s governance and risk management practices and making changes as needed 3. Selecting, compensating, monitoring and, when necessary, replacing key executives and overseeing succession planning. 4. Aligning key executive and board remuneration with the longer term interests of the company and its shareholders. 5. Ensuring the integrity of the organisation’s accounting and financial reporting systems; 6. Ensuring a formal and transparent board nomination and election ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams process. 10
  • 11. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 11
  • 12. Governance does not exist as a set of distinct and separate processes and structures. Rather, there are relationships among governance, risk management, and internal controls: § Effective governance activities consider risk when setting strategy. Conversely, risk management relies on effective governance (e.g., tone at the top, risk appetite and tolerance, risk culture, and the oversight of risk management). § Effective governance relies on internal controls and communication to the board on the effectiveness of those controls. § Control and risk also are related, as control is defined as “any action taken by management, the board and other parties to manage risk and increase the likelihood that established goals will be achieved.” ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 12 Internal Governance Elements
  • 13. Internal Governance Elements ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 13 Stakeholders
  • 14. IT Governance Definition ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 14 IT Governance is an integral part of enterprise governance and consists of the leadership and organisational structures and processes that ensure that the organisation’s IT sustains and extends the organisation’s strategies and objectives. IT governance is the responsibility of the board of directors and executive management. by the IT Governance Institute® “Technology is a tool to accomplish business, not an end in itself”
  • 15. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 15 COBIT: Governance of Enterprise IT
  • 16. ISACA Contribution to Study Period ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 16
  • 17. Ideas that were floated 2/2 ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 17
  • 18. Conclusion: ISG must differentiate itself from ITG because of Risks from Non-IT factors ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 18
  • 19. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 19
  • 20. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 20
  • 21. Why were they created? ISO 38500 1.3 Objectives The purpose of this standard is to promote effective, efficient, and acceptable use of IT in all organizations by: • assuring stakeholders (including consumers, shareholders, and employees) that, if the standard is followed, they can have confidence in the organization’s corporate governance of IT; • informing and guiding directors in governing the use of IT in their organization; and • providing a basis for objective evaluation of the corporate governance of IT. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 21
  • 22. Why were they created? ISO 27014 4.1 General Governance of information security needs to align objectives and strategies for information security with business objectives and strategies, and requires compliance with legislation, regulations and contracts. It should be assessed, analysed and implemented through a risk management approach, supported by an internal control system. The governing body is ultimately accountable for an organisation’s decisions and the performance of the organisation. In respect to information security, the key focus of the governing body is to ensure that the organisation’s approach to information security is efficient, effective, acceptable and in line with business objectives and strategies giving due regard to stakeholder expectations. Various stakeholders can have different values and needs. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 22
  • 23. What do they have in common? ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 23
  • 24. ISO 38500 ISO 27014 ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 24
  • 25. What distinguishes them from each other? 38500 fast tracked from AS8015; 27014 completely new! Only one mention in 38500 of ‘security’, namely as a bullet under 1.4.2 in respect of breaches: security standards! 38500 only refers to ISO Guide 73:2002 because revised Guide & ISO 31000 only published in 2009! 27014 refers to new Guide 73 & ISO 31000 plus 27005 and ITGI’s Security Governance Framework, and, of course to 38500 itself! 27014 gives examples in Annex of IS summary & detailed status reports; 38500 has none. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 25
  • 26. What distinguishes them from each other? ISO 38500 Principles* 1: Responsibility 2: Strategy 3: Acquisition 4: Performance 5: Conformance 6: Human Behaviour ISO 27014 5.2 Principles** 1 Establish organisation-wide information security 2 Adopt a risk-based approach 3 Set the direction of investment decisions 4 Ensure conformance with internal and external requirements 5 Foster a security-positive environment 6 Review performance in relation to business outcomes * Mere headings vs. ** action-oriented statements! ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 26
  • 27. Resources (1/3) GTAG-­‐15 Informa/on Security Governance § What is Informa/on Security Governance? § Why Should the CAE Be Concerned About Informa/on Security Governance? § The Internal Audit Ac/vity’s Role in Informa/on Security Governance § The Internal Audit Ac/vity’s Responsibili/es Related to Informa/on Security Governance § Audi/ng Informa/on Security Governance ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 27
  • 28. Resources (2/3) GTAG-­‐17 Audi/ng IT Governance Some of the key areas of IT governance internal auditors should address are: § Chief IT Officer (e.g. Chief Informa/on Officer; Chief Technology Officer; Chief Informa/on Security Officer) related roles and responsibili/es. § Accountability and decision-­‐making. § IT performance monitoring and repor/ng metrics, including financial management of IT opera/ons and projects. § CxO4 level of understanding of how IT supports and enables the achievement of the organiza/on’s strategy and objec/ves. § Alignment between IT and the organiza/on. § IT governance risks and controls. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 28
  • 29. Information technology is the Elephant in the Room – especially the boardroom. Organizations depend on it for routine operations and future performance, and IT problems can have serious consequences. Yet many organizations lack effective oversight of IT, and are at risk of surprises. This book aims to help build shared understanding that leads to a well-integrated system for governance of IT from the boardroom to the coalface, framed around the guidance in ISO/IEC 38500. Resources (3/3) ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 29 by Mark Toomey also author of The Infonomics Letter (free)
  • 30. ISO/IEC 27014:2013 & 38500:2009 – AFAI Délégation Sud-Est 13/11/14 - Hugh H. Penri-Williams 30 A nnex I Bibliography FR Cadre de référence international des pratiques professionnelles de l’audit interne [CRIPP] / IIA, IFACI trad. – 2013 IT Gouvernance / F. Georgel – 2009 La Gouvernance des Systèmes d’Information / Audit & Contrôle internes IFACI N°206 - sept. 2011 Prise de position IFA/IFACI sur le rôle de l’audit interne dans le gouvernement d’entreprise. – IFA ; IFACI – 2009