the International Organization for Standardization (ISO) developed the ISO/IEC 27001:2023 standard. This comprehensive set of guidelines helps businesses of all sizes establish, implement, and maintain an Information Security Management System (ISMS).
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
To protect your organization from cyber attacks, you need to implement a robust information security management system (ISMS) and business continuity management system (BCMS) based on international standards, such as ISO/IEC 27001 and ISO 22301.
Amongst others, the webinar covers:
• Why we need a cyber response plan to protect business operations
• Introduction to ISO/IEC 27001 and ISO 22301
• What do we need for a cyber security response plan?
• How do we develop a cyber security response plan?
Presenters:
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG.
Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant.
In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense, that prioritise key risks to the organisation and helped minimise disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicst in the Oil and Gas Industry.
Simon Lacey
Simon is a resourceful, creative Information & Cyber Security professional with a proven track record of instigating change, disrupting the status quo, influencing stakeholders and developing ‘big picture’ vision across business populations. Multiple industry experience; excels in building stakeholder engagement & consensus; and suporting organisations to make sustainable change.
Simon also has considerable experience of risk management, education and awareness, strategy development and consulting to senior management and is a confident and engaging public speaker.
Simon has previously worked within the NHS, Bank of England and BUPA, before setting out as an independent consultan forming Oliver Lacey Limited, supporting clients in multiple business sectors.
When not working, Simon loves to run – currently training for the Berlin Marathon, a Director of Aylesbury United Football Club, records vlogs and is an experienced standup comic.
Date: April 26, 2023
Find out more about ISO training and certification services
Training: https://bit.ly/3AyoyYF
https://bit.ly/3LbBVTx
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/i4qx5mjEqio
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
This webinar illustrates:
- An overview of the GDPR
- How an ISO 27001-aligned ISMS can support GDPR compliance
- The top risks that result in data breaches
- The benefits of implementing an ISMS
- The technical and organisational requirements to achieve GDPR compliance
- How to improve your overall information security in line with the GDPR’s requirements
A recording of the webinar can be found here: https://www.youtube.com/watch?v=s7XQwBQ6JMg
A to Z of Information Security ManagementMark Conway
The purpose of information security is to protect an organisation’s valuable assets, such as information, Intellectual property, hardware, and software.
Through the selection and application of appropriate safeguards or controls, information security helps an organisation to meet its business objectives by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets.
In this A to Z I’d like to outline some of the key focus areas for organisations wishing to pursue compliance to the ISO27001 Information Security standard.
What are the essential aspects of ISO 27001 Certification in Netherlands.pdfAnoosha Factocert
Factocert provides the best ISO 27001 Certification auditors in Amsterdam, The Hague, Rotterdam, Utrecht, Delft, and other major cities with consultation, implementation, documentation, Certification, audit, and other related services across the world at an affordable cost. Get Certified today.
In this article I will provide an Overview of A new Information Security Management System
Standard ISO/IEC 27001:2013 , The new standard just Published from a few Days Earlier .
ISO/IEC 27001:2013 Provides requirements for Establishing, Implementing, Maintaining
and Continually Improving an Information Security Management System.
ISO/IEC 27001:2013 gives Organization a Perfect Information Security management framework for implementing
and maintaining security.
In this Article, I tried to shed some light on new standard and its Mandatory Requirements, Optional Requirements ,
Structure , Benefits , Certification Process and Estimated time for Implementation and Certification.
the International Organization for Standardization (ISO) developed the ISO/IEC 27001:2023 standard. This comprehensive set of guidelines helps businesses of all sizes establish, implement, and maintain an Information Security Management System (ISMS).
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
To protect your organization from cyber attacks, you need to implement a robust information security management system (ISMS) and business continuity management system (BCMS) based on international standards, such as ISO/IEC 27001 and ISO 22301.
Amongst others, the webinar covers:
• Why we need a cyber response plan to protect business operations
• Introduction to ISO/IEC 27001 and ISO 22301
• What do we need for a cyber security response plan?
• How do we develop a cyber security response plan?
Presenters:
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG.
Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant.
In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense, that prioritise key risks to the organisation and helped minimise disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicst in the Oil and Gas Industry.
Simon Lacey
Simon is a resourceful, creative Information & Cyber Security professional with a proven track record of instigating change, disrupting the status quo, influencing stakeholders and developing ‘big picture’ vision across business populations. Multiple industry experience; excels in building stakeholder engagement & consensus; and suporting organisations to make sustainable change.
Simon also has considerable experience of risk management, education and awareness, strategy development and consulting to senior management and is a confident and engaging public speaker.
Simon has previously worked within the NHS, Bank of England and BUPA, before setting out as an independent consultan forming Oliver Lacey Limited, supporting clients in multiple business sectors.
When not working, Simon loves to run – currently training for the Berlin Marathon, a Director of Aylesbury United Football Club, records vlogs and is an experienced standup comic.
Date: April 26, 2023
Find out more about ISO training and certification services
Training: https://bit.ly/3AyoyYF
https://bit.ly/3LbBVTx
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/i4qx5mjEqio
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
This webinar illustrates:
- An overview of the GDPR
- How an ISO 27001-aligned ISMS can support GDPR compliance
- The top risks that result in data breaches
- The benefits of implementing an ISMS
- The technical and organisational requirements to achieve GDPR compliance
- How to improve your overall information security in line with the GDPR’s requirements
A recording of the webinar can be found here: https://www.youtube.com/watch?v=s7XQwBQ6JMg
A to Z of Information Security ManagementMark Conway
The purpose of information security is to protect an organisation’s valuable assets, such as information, Intellectual property, hardware, and software.
Through the selection and application of appropriate safeguards or controls, information security helps an organisation to meet its business objectives by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets.
In this A to Z I’d like to outline some of the key focus areas for organisations wishing to pursue compliance to the ISO27001 Information Security standard.
What are the essential aspects of ISO 27001 Certification in Netherlands.pdfAnoosha Factocert
Factocert provides the best ISO 27001 Certification auditors in Amsterdam, The Hague, Rotterdam, Utrecht, Delft, and other major cities with consultation, implementation, documentation, Certification, audit, and other related services across the world at an affordable cost. Get Certified today.
In this article I will provide an Overview of A new Information Security Management System
Standard ISO/IEC 27001:2013 , The new standard just Published from a few Days Earlier .
ISO/IEC 27001:2013 Provides requirements for Establishing, Implementing, Maintaining
and Continually Improving an Information Security Management System.
ISO/IEC 27001:2013 gives Organization a Perfect Information Security management framework for implementing
and maintaining security.
In this Article, I tried to shed some light on new standard and its Mandatory Requirements, Optional Requirements ,
Structure , Benefits , Certification Process and Estimated time for Implementation and Certification.
ISO 27001 is an international standard that collects requirements for the creation and development of an information security management system.
By and large, it is a collection of "best practices" that allows you to select security controls in such a way as to ensure the protection of information and provide customers with appropriate guarantees.
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
This webinar gives an idea of what is the relation of ISO 27032 with ISO 55001, and how these two standards cover one another. Get more information on Cybersecurity as the importance is given more to the security industry nowadays.
Main points covered:
• Protection assets in Cyberspace
• Covering ISO 27032 in ISO 55001 and ISO 55001 in ISO 27032
• Sample of Cybersecurity Risks in Assets
• Highlights of the Implementation of the Cyber Security program Framework
Presenter:
This webinar was presented by PECB Partner and Trainer Mr. Claude Essomba, who is a Managing Director at GETSEC SARL, and has more than 9 years of experience in IT and Information Security.
Link of the recorded session published on YouTube: https://youtu.be/_280jG77iKY
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
Cybersecurity is an ongoing journey. The regular update and improvement of security measures is essential to stay ahead of evolving threats.
Amongst others, the webinar covers:
• Benefits of Compliance
• Digital Transformation: Why
• ISO/IEC 27001 and ISO/IEC 27032
• ISO/IEC 27001: Information Security Management System (ISMS)
• ISO/IEC 27032: Cybersecurity Framework
Presenters:
Douglas Brush
Douglas Brush is a federally court-appointed Special Master, and Court Appointed Neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.
He is an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues.
He is the founder and host of Cyber Security Interviews, a popular information security podcast.
Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, diversity, equity, and inclusion, in the information security industry.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Carole Njoya
Founder in 2018 of Alcees, a Paris-based management consulting fabric specialized in cybersecurity, data privacy governance and digital trust, Carole Njoya provides independent, tailored and expert advisory to companies doing business in European markets and serving both B2B and B2C customers. With more than 100 cybersecurity projects delivered, she assists entities in preparing, implementing and maintaining the right best practices under the ISO 27001 compliance framework and GDPR article 25 obligation (Privacy by design) for their vendors. Carole Njoya featured in the « Women Know Cybersecurity » 2019 Twitter list edited by Cybercrime Magazine. Carole Njoya is committed in science and engineering since pre-teen period.
Date: September 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
YouTube video: https://youtu.be/U7tyzUrh8aI
ISO 27001:2013 is the international standard that provides a framework for Information Security Management Systems (ISMS) to provide continued confidentiality, integrity and availability of information as well as legal compliance.
ISO 27001 certification is essential for protecting your most vital assets like employee and client information, brand image and other private information. The ISO standard includes a process-based approach to initiating, implementing, operating and maintaining your ISMS.
This implementation guide will help you run through the benefits, PDCA Cycle and Annex SL structure in detail for implementing ISO 27001.
Find out more or get a quote for certification here – https://www.nqa.com/en-gb/certification/standards/iso-27001
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
ISO 27001 provides a comprehensive set of guidelines for organizations to implement, maintain, and continually improve their ISMS. The standard outlines a systematic approach to identifying, analysing, and managing information security risks, ensuring that appropriate controls are in place to protect the confidentiality, integrity, and availability of information assets.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
ISO 27001 is an international standard that collects requirements for the creation and development of an information security management system.
By and large, it is a collection of "best practices" that allows you to select security controls in such a way as to ensure the protection of information and provide customers with appropriate guarantees.
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
This webinar gives an idea of what is the relation of ISO 27032 with ISO 55001, and how these two standards cover one another. Get more information on Cybersecurity as the importance is given more to the security industry nowadays.
Main points covered:
• Protection assets in Cyberspace
• Covering ISO 27032 in ISO 55001 and ISO 55001 in ISO 27032
• Sample of Cybersecurity Risks in Assets
• Highlights of the Implementation of the Cyber Security program Framework
Presenter:
This webinar was presented by PECB Partner and Trainer Mr. Claude Essomba, who is a Managing Director at GETSEC SARL, and has more than 9 years of experience in IT and Information Security.
Link of the recorded session published on YouTube: https://youtu.be/_280jG77iKY
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
Cybersecurity is an ongoing journey. The regular update and improvement of security measures is essential to stay ahead of evolving threats.
Amongst others, the webinar covers:
• Benefits of Compliance
• Digital Transformation: Why
• ISO/IEC 27001 and ISO/IEC 27032
• ISO/IEC 27001: Information Security Management System (ISMS)
• ISO/IEC 27032: Cybersecurity Framework
Presenters:
Douglas Brush
Douglas Brush is a federally court-appointed Special Master, and Court Appointed Neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.
He is an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues.
He is the founder and host of Cyber Security Interviews, a popular information security podcast.
Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, diversity, equity, and inclusion, in the information security industry.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Carole Njoya
Founder in 2018 of Alcees, a Paris-based management consulting fabric specialized in cybersecurity, data privacy governance and digital trust, Carole Njoya provides independent, tailored and expert advisory to companies doing business in European markets and serving both B2B and B2C customers. With more than 100 cybersecurity projects delivered, she assists entities in preparing, implementing and maintaining the right best practices under the ISO 27001 compliance framework and GDPR article 25 obligation (Privacy by design) for their vendors. Carole Njoya featured in the « Women Know Cybersecurity » 2019 Twitter list edited by Cybercrime Magazine. Carole Njoya is committed in science and engineering since pre-teen period.
Date: September 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
YouTube video: https://youtu.be/U7tyzUrh8aI
ISO 27001:2013 is the international standard that provides a framework for Information Security Management Systems (ISMS) to provide continued confidentiality, integrity and availability of information as well as legal compliance.
ISO 27001 certification is essential for protecting your most vital assets like employee and client information, brand image and other private information. The ISO standard includes a process-based approach to initiating, implementing, operating and maintaining your ISMS.
This implementation guide will help you run through the benefits, PDCA Cycle and Annex SL structure in detail for implementing ISO 27001.
Find out more or get a quote for certification here – https://www.nqa.com/en-gb/certification/standards/iso-27001
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
ISO 27001 provides a comprehensive set of guidelines for organizations to implement, maintain, and continually improve their ISMS. The standard outlines a systematic approach to identifying, analysing, and managing information security risks, ensuring that appropriate controls are in place to protect the confidentiality, integrity, and availability of information assets.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
1. School: School of Education, Social
Sciences and Technology
Degree Programme: Bachelors of Information
Technology
Course: Strategic IS and Business Policy- BIT 442
Assignment No. 1
Lecturer’s Name: Mr. Gilbert Mwale
Student No: BIT19114277
Student Name: LIIEWA SONGOLO
Student E-mail: liiewasongolo26@gmail.com
UNILUS Pioneer Campus
P.O. Box 36711
LUSAKA.
Physical Address:
UNILUS
Plot No. 37413, Off Alick Nkhata Road (Behind Alliance Francaise), Mass Media,
LUSAKA
2. 1. Standard: ISO/IEC 27001
2. The ISO code for ISO/IEC 27001 is 27001
Here is more information about the standard, such as its release year, primary
objectives, and characteristics:
Launch Year: The first edition of ISO/IEC 27001 was released in 2005. Since then, it
has undergone alterations; the most recent being ISO/IEC 27001:2013.
Principal Goals:
Information Security Management: The main goal of ISO/IEC 27001 is to give
organizations a methodical and organized approach to managing information security.
It aids in the creation and upkeep of efficient information security management
systems (ISMS) for enterprises.
Risk Management: Information security risks must be recognized, evaluated, and
managed, according to ISO/IEC 27001. Organizations are obliged to assess the
possible threats to their information assets and put in place adequate security
measures to lessen or manage these threats.
Continuous Improvement: The standard encourages a culture of ongoing
information security improvement. Organizations are advised to continuously monitor
and review it to ensure their ISMS stays successful in the face of changing threats and
vulnerabilities.
Key Attributes:
Information security is approached from a risk-based perspective in accordance
with ISO/IEC 27001 standards. As a result, businesses must evaluate the threats
to their information assets and determine priorities for their efforts and resources
based on the severity of the threats.
Complete Controls: Annex A of the standard contains a complete list of security
controls and goals. Access control, cryptography, physical security, and incident
management are just a few of the measures that address various facets of
information security. These controls can be chosen and customized by
organizations to meet their own demands.
The importance of top management's commitment to information security is
emphasized by ISO/IEC 27001. An organization's leadership should show
support for the ISMS and make sure that it is incorporated into all of the
organization's operational procedures.
What makes ISO/IEC 27001 so important?
The management of cyber-risks can appear challenging or even unattainable given the
surge in cybercrime and the ongoing emergence of new threats. Organizations can
become risk-aware by using ISO/IEC 27001, which also enables them to spot and fix
problems early on.
3. Information security is promoted holistically by ISO/IEC 27001, which involves
screening people, policy, and technology. A tool for risk management, cyber-
resilience, and operational excellence is an information security management system
that has been implemented in accordance with this standard.
The three principles of the ISO/IEC 27001 are:
Confidentiality: Only the appropriate people can access the information kept by the
company. An example would be Using encryption to protect sensitive information
from unauthorized access and decipherment.
Integrity: Data that the organization utilizes to further its business or keeps safe for
others is reliably stored and not destroyed or corrupted.
Verifying the integrity and authenticity of electronic documents and conversations
using digital signatures.
Availability: Meaning that the organization and its clients can access the information
whenever it is necessary so that business aims and customer expectations are achieved.
Setting up redundant systems and backups to ensure that services and data are
available even in the event of hardware failures
3. Overview of ISO/IEC 27001
The world's largest developer of voluntary international standards is the International
Organization for Standardization (ISO), a nongovernmental organization that operates
independently. The International Electrotechnical Commission (IEC) is the top body
in the world for developing and disseminating international standards for technology
connected to electrical, electronic, and allied fields.
The ISO/IEC 27000 family of standards, which were released by the joint ISO/IEC
subcommittee, include hundreds of controls and control mechanisms that can be used
by companies of all shapes and sizes to safeguard their information assets. These
international standards give organizations a framework for policies and practices that
cover all physical, technical, and legal controls involved in information risk
management operations.
An Information Security Management System (ISMS) is formally specified in the
security standard ISO/IEC 27001 with the goal of bringing information security under
explicit management control. It establishes standards for how to install, oversee, keep
up with, and continuously enhance the ISMS as a formal specification. Additionally,
it recommends a set of best practices that cover the need for documentation,
responsibility divisions, availability, access control, security, auditing, and corrective
and preventive actions. Organizations can more easily adhere to the many statutory
and regulatory requirements related to the protection of information by obtaining
ISO/IEC 27001 certification. (Microsoft Corporation, 2023)
4. Question 2
1.
i. Failure due to technology: The computerized systems may experience problems
that cause downtime and operational disruptions.
ii. Security Breaches: Automation involves the digital storage of sensitive consumer
and financial information, which leaves it open to cyberattacks and data breaches.
iii. Cost: Due to unforeseen costs for software, hardware, or consulting services, the
project may go above its allocated budget.
iv. Resistance by Employees: Fearing a loss of employment or having trouble
adjusting to new technologies, employees may resistresistant to the automation
process.
v. Training Issues: Staff may need substantial training to use the new systems
successfully, which could cause production losses while they are adjusting.
vi. Integration problems: It's possible that the new technology won't connect
perfectly with the current systems, leading to ineffective operations.
vii. Compliance with regulations: Modifications to data processing and reporting
procedures may result in problems adhering to industry rules and data privacy
legislation.
viii. Vendor Reliability: Project schedules may be affected if the company depends on
outside vendors for technology parts or services.
ix. Scalability: As the firm expands, the system could be difficult to scale,
necessitating further expenditures and disruptions.
x. Dependencies that weren't anticipated: Dependencies on outside elements,
including software upgrades or third-party services, could be dangerous.
xi. Project Delays: The project timetable may be extended by delays in the delivery
of hardware or software or by unforeseen problems.
xii. Loss of Institutional information: If valuable institutional information is not
properly documented, the firm may lose it as procedures become more automated.
Assumption List:
Resource Accessibility: Assuming that the project has access to the finance and
experienced IT personnel that it needs.
Data Backup and Recovery: Assuming effective data backup and recovery
practices are in place to reduce the risk of data loss.
Regulatory Compliance: Assuming that the project will abide by all applicable
data privacy laws and industry standards.
Change Management: Assuming that a thorough plan for dealing with change-
related employee resistance is in place to address it and ensure a smooth
transition.
Vendor Reliability: Assuming that the service or technology suppliers chosen are
dependable and capable of meeting project deadlines.
Backing from Stakeholders: Assuming that the automation program has the
backing of important stakeholders like employees, management, and investors.
2.
5. 3. RISK MATRIX
RISK
RATING
KEY
LOW MEDIUM HIGH EXTREME
0 –
ACCEPTABLE
1 – ALARP
as low as
reasonably
practicable
2 –
GENERALLY
UNACCEPTA
BLE
3 –
INTOLERABL
E
–––––––––––––
–––––
OK TO
PROCEED
–––––––––––––
–––––
TAKE
MITIGATION
EFFORTS
–––––––––––––
–––––
SEEK
SUPPORT
–––––––––––––
–––––
PLACE
EVENT
ON HOLD
SEVERITY
ACCEPTABLE TOLERABLE
UNDESIRABL
E
INTOLERABL
E
LIKELIHO
OD
LITTLE TO
NO EFFECT
ON EVENT
EFFECTS ARE
FELT,
BUT NOT
CRITICAL
TO OUTCOME
SERIOUS
IMPACT
TO THE
COURSE OF
ACTION
AND
OUTCOME
COULD
RESULT
IN DISASTER
IMPROBA
BLE
LOW MEDIUM MEDIUM HIGH
RISK IS
UNLIKEL
Y
TO
OCCUR
– 1 – – 4 – – 6 – – 10 –
POSSIBLE LOW MEDIUM HIGH EXTREME
RISK
WILL
LIKELY
OCCUR
– 2 – – 5 – – 8 – – 11 –
PROBABL
E
MEDIUM HIGH HIGH EXTREME
RISK
WILL
OCCUR
– 3 – – 7 – – 9 – – 12 –
6. REFERENCES
Culot, G., Nassimbeni, G., Podrecca, M. and Sartor, M. (2021), "The ISO/IEC 27001
information security management standard: literature review and theory-based
research agenda", The TQM Journal, Vol. 33 No. 7, pp. 76-
105. https://doi.org/10.1108/TQM-09-2020-0202
Microsoft Corporation. (2023). ISO/IEC 27001:2013 Information Security
Management Standards. Retrieved from [https://learn.microsoft.com/en-
us/compliance/regulatory/offering-iso-27001]
Project Management Institute (2008). A Guide to the Project Management Body of
Knowledge (PMBOK® Guide). 4th Edition. Project Management Institute