SlideShare a Scribd company logo
ITIL Indonesia – “Manfaat Penerapan Sistem Manajemen
Keamanan Informasi”
ITIL Indonesia Jakarta, 28 Oktober 2021
MANFAAT PENERAPAN
SISTEM MANAJEMEN
KEAMANAN INFORMASI
BAGI PARA PENGGUNA &
PENYEDIA LAYANAN TI
Febryan Alandiestya
28 Oktober 2021
PRESENTATION
OUTLINE
Introduction to InfoSec Management System
 What is InfoSec?
 InfoSec Frameworks
 Why using ISO 27001?
 How to implement ISO 27001?
The Strong Correlation between InfoSec with ITIL
 The Dimensions Modelling
 Some Key Implementations
 Some Important Notes
 The Continual Improvement
It’s the Perfect Combination Ever!
 Have You Aware Enough?
 Can You See the Advantages?
 The Never-ending (Good) Improvements
INTRODUCTION TO
INFORMATION
SECURITY
MANAGEMENT
SYSTEM
What is Information Security
Management System?
It is a set of policies and controls that manage
security and risks systematically, across the
entire enterprise. Remember, we should
maintain these CIA triads:
Confidentiality
Secret information is protected from unauthorized
disclosure.
Integrity
Information is protected from unauthorized changes
to ensure that it is reliable and correct.
Availability
Protecting the functionality of support systems and
ensuring that information is fully available at the
point in time.
Information
Assets
About Information Assets …
“Aset informasi adalah kumpulan data
yang memiliki nilai dan diakui oleh
suatu lembaga untuk keperluan
menjalankan fungsi bisnisnya, serta
memenuhi persyaratan lembaga itu
sendiri.”
(Queensland Government Enterprise Architecture)
Information Security Management System Frameworks
01
This Payment Card Industry
Data Security Standard used by
47% of organizations (the
handling of credit and debit card
information).
02
This International Organization
for Standardization used by
35% of organizations (best
practices by many).
03
This Critical Security Controls
used by 32% of organizations
(developed voluntarily).
04
This National Institute of
Standards Technology
Cybersecurity Framework used
by 29% of organizations (many
amandements).
PCI DSS ISO 27001 CIS NIST
Its Headquarter located in Geneva, which was
founded in London (UK) on 23 February 1947.
Nowadays, ISO strives to standardize business
processes and procedures around the world. It has
published more than 22,700 standards.
Among those numerous standards, there is ISO 27001
which is the accepted global benchmark for the
effective management of information assets, enabling
organizations to avoid costly penalties and financial
losses.
What is ISO?
Source: https://www.itgovernanceusa.com/blog/top-4-cybersecurity-frameworks
Why do We Need ISO 27001?
Comply with
Regulations
Increasing the
Customers’ Trust
Minimizing Risk & Threats, Incidents,
Unnecessary Expenses, etc.
Comply with PP. 71; Permen.
Kominfo; Perban. BSSN; and
many others.
This standard already
recognized all over the world
which always updated regularly.
Having a risk-based approach so that organization
can detect various potential threats, even planning
how to deal with them.
A Standard which Fits with Chapter
5.1.3 in ITIL v4
Intended to protect the information needed by the
organization to conduct its business, including the
understanding and managing risks to the
confidentiality, integrity, & availability of information,
as well as other aspects.
1. Regulations by Indonesian Government Regulation
Kewajiban
Penyelenggara Sistem Elektronik wajib melakukan pengamanan terhadap komponen Sistem
Elektronik.
(Peraturan Pemerintah No. 71 Tahun 2019 – Pasal 23)
Sanksi Administratif
a. teguran tertulis;
b. denda administratif;
c. penghentian sementara;
d. pemutusan Akses; dan/atau
e. dikeluarkan dari daftar.
(Peraturan Pemerintah No. 71 Tahun 2019 – Pasal 100 ayat 2)
Let’s Check the Chapter 1 of PP No. 71 Year 2019
About the “General Requirements”
Chapter 1 of PP No. 71 Year 2019 (Continued)
About the “General Requirements”
2. Regulations by the Minister of Communication and Information
Kewajiban
PSE Strategis dan Tinggi wajib memiliki sertifikat pengamanan/keamanan informasi.
PSE Rendah dapat memiliki sertifikat pengamanan/keamanan informasi.
(Peraturan Menteri Kominfo No. 4 Tahun 2016 – Bab IV pasal 10 & 11)
Sanksi Administratif
a. Teguran tertulis; dan
b. Pemberhentian sementara Nama Domain Indonesia.
(Peraturan Menteri Kominfo No. 4 Tahun 2016 – Bab X pasal 25 ayat 2)
3. Regulations by National Cyber ​​& Crypto Agency (BSSN):
Kewajiban
PSE Strategis: ISO 27001 + Indeks KAMI + Standar Keamanan lain yang ditetapkan oleh
Kementerian/Lembaga terkait.
PSE Tinggi: ISO 27001 dan/atau Indeks KAMI + Standar Keamanan lain yang ditetapkan oleh
Kementerian/Lembaga terkait.
PSE Rendah: ISO 27001 atau Indeks KAMI
(Peraturan Badan BSSN No. 8 Tahun 2020 – Bab IV Pasal 9)
Sanksi
Teguran tertulis, setelah bila ditemukan adanya pelanggaran.
(Peraturan Badan BSSN No. 8 Tahun 2020 – Bab VI Pasal 37)
How to Implement ISO 27001?
The organization
shall determine the
boundaries and
applicability of the
ISMS to establish its
scope. Don’t forget to
refer to the
regulations.
Identify the
Scope
Which aspect(s)? Top-tier direction Fulfill requirements Review & improve!
Top Management
shall demonstrate
leadership and
commitment with
respect to the ISMS
by doing 8 points of
activities.
Top
Management
Commitment
There are 26
Requirements plus
114 Clauses/Annex
shall be followed
(implemented), which
most of them are
mandatory
requirements.
Implement
Requirements &
Clauses/Annex
Check/recheck
implementation and
practice using
activities called
audits (regular or
annual) that lead to a
stronger ISMS
practices.
Audits & Get
Certified
The Dimensions Modelling
This includes the information created,
managed and used in the course of
organization’s needs, also the use of
technologies that support and enable that
system.
Information & Technology
This ranges from formal contracts with
clear separation of responsibilities, to
flexible partnerships where they share
common goals and risks and collaborate
to achieve desired outcomes.
Partners & Suppliers
The organization also needs a culture
that supports its objectives, and the right
level of capacity and competency among
its workforce also motivate people to
work in desirable ways.
Organizations & People
It refers to the daily activities, workflows,
controls, and procedures needed to
achieve organization’s objectives.
Value Streams & Processes
Some Existing Key Implementations
1. The Risk Assessment & Register
InfoSec
Annex 6.1.2 & 6.1.3
Req. 4.1
Req. 5.1 & 5.2
Req. 5.3
Annex 12.1.3
Annex 12.1.2
Annex 16.1.1 & 16.1.5
IT Service
Chapter 2.5.3 & 5.1.10
Chapter 3.5
Chapter 4.3.4
Chapter 4.4.1
Chapter 5.2.3
Chapter 5.2.4
Chapter 5.2.5
2. Internal & External Factors
3. Top Management Leadership and Commitment
4. Organizational Roles, Responsibilities and Authorities
5. Capacity Management
6. Change Management
7. Incident Management
Part I
Some Existing Key Implementations
8. Asset Register
InfoSec
Annex 8.1.1 & 8.1.2
Annex 12.4.1 – 12.4.3
Annex 16.1.2 & 16.1.4
Annex 14.2.1 – 14.2.9
IT Service
Chapter 5.2.6
Chapter 5.2.7
Chapter 5.2.7
Chapter 5.3.3
9. Logs Monitoring
10. Event Management
11. Software Development
Part II
Some ISMS Important Notes for ITSM
1. Deploy Information Security Policies, Targets and How to Achieve Them
2. Register their assets, risks & their treatments thoroughly
3. Define the needed human resources, their competencies & integrity agreements
4. Raise and monitor the employees’ awareness on securing information & its assets
5. Deploy the Information Classification as well as Documented Information Handling
6. Define & conduct the audit or review regularly
Fundamentally, based on ISO 27001 Requirements, it will be better for your organization to:
7. Define regulations to the Physical Security, Removable Media Usage, etc.
The Continual Improvement
[ISO 27001] Requirements 8
[ITIL] 6 Improvement Steps
“Do” Phase
[ISO 27001] Requirements 9
[ITIL] 6 Improvement Steps
“Check” Phase
[ISO 27001] Requirements 4 – 7
[ITIL] 6 Improvement Steps
“Plan” Phase
[ISO 27001] Requirements 10
[ITIL] 6 Improvement Steps
“Act” Phase
IT’S THE PERFECT
COMBINATION EVER!
Let’s Rewind to Chapter 1 of PP No. 71 Year 2019
About the “General Requirements”
Which Thought that Never Come in Your Mind?
Shut your mouth,
our data is not
that important!
Confidentiality
Don't worry, nothing
will happen, don't
overthink about it!
Integrity
Hey listen, our
system is very
sophisticated
and safe!
Availability
ISO is a risk-based thinking. So please, minimize those low-awareness thoughts!!!
These Are the Real Advantages
ISO 20000-1 (IT Service Management)
ISO 27701 (Personal Information MS);
ISO 27032 (Cybersecurity);
ISO 27017 (InfoSec for Cloud Computing)
ISO 27018 (Privacy in Cloud Computing);
ISO 27033 (IT Network Security);
ISO 27045 (Big Data Security & Privacy);
ISO 27400 (Security & Privacy for IoT).
Extending the Compliances &
Protections
Obey and comply with state regulations that
have important impacts on maintaining
information security on a national scale.
Upholding Our Country’s
Nationalism
Having an ISMS certified by an accredited
certification body is concrete evidence that
your organization is in a strong position for
paying attention their internal/external needs.
Strengthen the Confidence of IT
Service Users
Organizations & people, information &
technology, value stream & processes,
partners & suppliers will be encapsuled with
ISMS mindset.
Strengthen the 4-dimension
Modelling
Wait, There Are Some Hidden Advantages!
It is about the
continual processes
of delivering fast and
reliable IT service
Information
Technology
Infrastructure
Library (ITIL)
IT Service
It is about the
continual processes
of securing the
information assets
International
Organization for
Standardization
(ISO) 27001
Information Security
+
(Pasal 3 PP. No. 71 year 2019)
=
Reliable + Secure
The Never-ending (Good) Improvements
Strive to be diligent in reviewing your
password and PIN usage, is it strong
enough?
Avoid spreading sensitive and
confidential information/data without
control, especially on social media.
For You, Your Family, and Your Organization
Use the appropriate method when
destroying unused document or
information.
Pay attention to your surroundings
when processing important or
sensitive information.
Be patient, don’t be easily attracted by
tempting and suspicious offers.
Strive to be diligent in reviewing any
kind of transactions, as well as login or
logout history.
Strive diligently to review the availability
and security status of your valuable
information assets.
Strive to be diligent in educating
yourself related to information security.
Learn, then implement improvements every time you faced information security incidents
“A person who constantly care about any possible
information security threats & risks in order to maintain
the reputation of you or your organization, don’t mock
them!”
Febryan Alandiestya
“Security is a process, not a product”
Bruce Schneier
(A famous American cryptographer, computer security professional, privacy specialist, and writer)
TERIMA KASIH
matur suwun | ‫شكرا‬ | thank you | 謝謝 | hatur nuhun | merci
Febryan A. A.
Stay Connected With Us!
t.me/itil_id
ITIL Indonesia
ITIL Indonesia
ITIL Indonesia
@itil_indonesia
@itil_id
ITIL Indonesia
Scan here!
Thank You!

More Related Content

What's hot

Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
Elkanouni Mohamed
 
Cobit, itil and cmmi - a tutorial
Cobit, itil and cmmi  - a tutorialCobit, itil and cmmi  - a tutorial
Cobit, itil and cmmi - a tutorialseveman
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
NQA
 
Cobit
CobitCobit
Business IT Management - Intro to CobiT & ITIL
Business IT Management - Intro to CobiT & ITILBusiness IT Management - Intro to CobiT & ITIL
Business IT Management - Intro to CobiT & ITIL
Ahmad Hafeezi
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
PECB
 
Iso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookIso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbook
Hazel Jennings
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
COBIT 5 Basic Concepts
COBIT 5 Basic ConceptsCOBIT 5 Basic Concepts
COBIT 5 Basic Concepts
Spyros Ktenas
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information SecuritySeto Joseles
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
Network Intelligence India
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
Gaffri Johnson
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013SAIGlobalAssurance
 
CObIT
CObITCObIT
It governance
It governanceIt governance
It governance
Mahetab Khan
 
Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology Governance
Goutama Bachtiar
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
Eryk Budi Pratama
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
Kinverg
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
n|u - The Open Security Community
 

What's hot (20)

Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
Cobit, itil and cmmi - a tutorial
Cobit, itil and cmmi  - a tutorialCobit, itil and cmmi  - a tutorial
Cobit, itil and cmmi - a tutorial
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
Cobit
CobitCobit
Cobit
 
Business IT Management - Intro to CobiT & ITIL
Business IT Management - Intro to CobiT & ITILBusiness IT Management - Intro to CobiT & ITIL
Business IT Management - Intro to CobiT & ITIL
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Iso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbookIso iec 38500 ict governance workbook
Iso iec 38500 ict governance workbook
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
COBIT 5 Basic Concepts
COBIT 5 Basic ConceptsCOBIT 5 Basic Concepts
COBIT 5 Basic Concepts
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information Security
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
CObIT
CObITCObIT
CObIT
 
It governance
It governanceIt governance
It governance
 
Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology Governance
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
 

Similar to (ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keamanan Informasi

2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
ControlCase
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
PECB Webinar: The alignment of Information Security in Service Management
PECB Webinar: The alignment of Information Security in Service ManagementPECB Webinar: The alignment of Information Security in Service Management
PECB Webinar: The alignment of Information Security in Service Management
PECB
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
NA Putra
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
Yerlin Sturdivant
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
PECB
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
SIS Certifications Pvt Ltd
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
Fahmi Albaheth
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
ControlCase
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certification
ramya119
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
Tromenz Learning
 
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
brandname33
 
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
IJNSA Journal
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
PECB
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
himalya sharma
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
Akhil Garg
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
Operational Excellence Consulting
 
iso 27001 certification
iso 27001 certificationiso 27001 certification
iso 27001 certification
denieljulian79
 
Tripwire Iso 27001 Wp
Tripwire Iso 27001 WpTripwire Iso 27001 Wp
Tripwire Iso 27001 Wp
ketanaagja
 
02 sasaran kendali pencapaian tujuan v05
02 sasaran kendali pencapaian tujuan v0502 sasaran kendali pencapaian tujuan v05
02 sasaran kendali pencapaian tujuan v05
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 

Similar to (ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keamanan Informasi (20)

2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
PECB Webinar: The alignment of Information Security in Service Management
PECB Webinar: The alignment of Information Security in Service ManagementPECB Webinar: The alignment of Information Security in Service Management
PECB Webinar: The alignment of Information Security in Service Management
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certification
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
 
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
 
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
iso 27001 certification
iso 27001 certificationiso 27001 certification
iso 27001 certification
 
Tripwire Iso 27001 Wp
Tripwire Iso 27001 WpTripwire Iso 27001 Wp
Tripwire Iso 27001 Wp
 
02 sasaran kendali pencapaian tujuan v05
02 sasaran kendali pencapaian tujuan v0502 sasaran kendali pencapaian tujuan v05
02 sasaran kendali pencapaian tujuan v05
 

More from ITIL Indonesia

(ONLINE) ITIL Indonesia Community - Service Level Management
(ONLINE) ITIL Indonesia Community - Service Level Management(ONLINE) ITIL Indonesia Community - Service Level Management
(ONLINE) ITIL Indonesia Community - Service Level Management
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design
(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design
(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?
(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?
(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...
(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...
(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM
(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM
(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Practical SACM
(ONLINE) ITIL Indonesia Community - Practical SACM(ONLINE) ITIL Indonesia Community - Practical SACM
(ONLINE) ITIL Indonesia Community - Practical SACM
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
ITIL Indonesia
 
(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue
(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue
(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue
ITIL Indonesia
 

More from ITIL Indonesia (20)

(ONLINE) ITIL Indonesia Community - Service Level Management
(ONLINE) ITIL Indonesia Community - Service Level Management(ONLINE) ITIL Indonesia Community - Service Level Management
(ONLINE) ITIL Indonesia Community - Service Level Management
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
(ONLINE) ITIL Indonesia Community - Sinergi ITSM dan Enterprise Architecture
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design
(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design
(ONLINE) ITIL Indonesia Community - Practice of RACI in ITIL®️ Process Design
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?
(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?
(ONLINE) ITIL Indonesia Community - Siapkah Indonesia Menerapkan ITIL v4?
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...
(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...
(ONLINE) ITIL Indonesia Community - Enterprise Agile Implementation with ITIL...
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM
(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM
(ONLINE) ITIL Indonesia Community - My 5 Biggest Mistakes When Implementing ITSM
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Practical SACM
(ONLINE) ITIL Indonesia Community - Practical SACM(ONLINE) ITIL Indonesia Community - Practical SACM
(ONLINE) ITIL Indonesia Community - Practical SACM
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
(ONLINE) ITIL Indonesia Community - How to Cook Your CMDB in Five Steps
 
(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement(ONLINE) ITIL Indonesia Community - Meetup Announcement
(ONLINE) ITIL Indonesia Community - Meetup Announcement
 
(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue
(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue
(ONLINE) ITIL Indonesia Community - Pengenalan Tentang IT Service Catalogue
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keamanan Informasi

  • 1. ITIL Indonesia – “Manfaat Penerapan Sistem Manajemen Keamanan Informasi” ITIL Indonesia Jakarta, 28 Oktober 2021
  • 2.
  • 3. MANFAAT PENERAPAN SISTEM MANAJEMEN KEAMANAN INFORMASI BAGI PARA PENGGUNA & PENYEDIA LAYANAN TI Febryan Alandiestya 28 Oktober 2021
  • 4. PRESENTATION OUTLINE Introduction to InfoSec Management System  What is InfoSec?  InfoSec Frameworks  Why using ISO 27001?  How to implement ISO 27001? The Strong Correlation between InfoSec with ITIL  The Dimensions Modelling  Some Key Implementations  Some Important Notes  The Continual Improvement It’s the Perfect Combination Ever!  Have You Aware Enough?  Can You See the Advantages?  The Never-ending (Good) Improvements
  • 6. What is Information Security Management System? It is a set of policies and controls that manage security and risks systematically, across the entire enterprise. Remember, we should maintain these CIA triads: Confidentiality Secret information is protected from unauthorized disclosure. Integrity Information is protected from unauthorized changes to ensure that it is reliable and correct. Availability Protecting the functionality of support systems and ensuring that information is fully available at the point in time. Information Assets
  • 7. About Information Assets … “Aset informasi adalah kumpulan data yang memiliki nilai dan diakui oleh suatu lembaga untuk keperluan menjalankan fungsi bisnisnya, serta memenuhi persyaratan lembaga itu sendiri.” (Queensland Government Enterprise Architecture)
  • 8. Information Security Management System Frameworks 01 This Payment Card Industry Data Security Standard used by 47% of organizations (the handling of credit and debit card information). 02 This International Organization for Standardization used by 35% of organizations (best practices by many). 03 This Critical Security Controls used by 32% of organizations (developed voluntarily). 04 This National Institute of Standards Technology Cybersecurity Framework used by 29% of organizations (many amandements). PCI DSS ISO 27001 CIS NIST Its Headquarter located in Geneva, which was founded in London (UK) on 23 February 1947. Nowadays, ISO strives to standardize business processes and procedures around the world. It has published more than 22,700 standards. Among those numerous standards, there is ISO 27001 which is the accepted global benchmark for the effective management of information assets, enabling organizations to avoid costly penalties and financial losses. What is ISO? Source: https://www.itgovernanceusa.com/blog/top-4-cybersecurity-frameworks
  • 9. Why do We Need ISO 27001? Comply with Regulations Increasing the Customers’ Trust Minimizing Risk & Threats, Incidents, Unnecessary Expenses, etc. Comply with PP. 71; Permen. Kominfo; Perban. BSSN; and many others. This standard already recognized all over the world which always updated regularly. Having a risk-based approach so that organization can detect various potential threats, even planning how to deal with them. A Standard which Fits with Chapter 5.1.3 in ITIL v4 Intended to protect the information needed by the organization to conduct its business, including the understanding and managing risks to the confidentiality, integrity, & availability of information, as well as other aspects.
  • 10. 1. Regulations by Indonesian Government Regulation Kewajiban Penyelenggara Sistem Elektronik wajib melakukan pengamanan terhadap komponen Sistem Elektronik. (Peraturan Pemerintah No. 71 Tahun 2019 – Pasal 23) Sanksi Administratif a. teguran tertulis; b. denda administratif; c. penghentian sementara; d. pemutusan Akses; dan/atau e. dikeluarkan dari daftar. (Peraturan Pemerintah No. 71 Tahun 2019 – Pasal 100 ayat 2)
  • 11. Let’s Check the Chapter 1 of PP No. 71 Year 2019 About the “General Requirements”
  • 12. Chapter 1 of PP No. 71 Year 2019 (Continued) About the “General Requirements”
  • 13. 2. Regulations by the Minister of Communication and Information Kewajiban PSE Strategis dan Tinggi wajib memiliki sertifikat pengamanan/keamanan informasi. PSE Rendah dapat memiliki sertifikat pengamanan/keamanan informasi. (Peraturan Menteri Kominfo No. 4 Tahun 2016 – Bab IV pasal 10 & 11) Sanksi Administratif a. Teguran tertulis; dan b. Pemberhentian sementara Nama Domain Indonesia. (Peraturan Menteri Kominfo No. 4 Tahun 2016 – Bab X pasal 25 ayat 2)
  • 14. 3. Regulations by National Cyber ​​& Crypto Agency (BSSN): Kewajiban PSE Strategis: ISO 27001 + Indeks KAMI + Standar Keamanan lain yang ditetapkan oleh Kementerian/Lembaga terkait. PSE Tinggi: ISO 27001 dan/atau Indeks KAMI + Standar Keamanan lain yang ditetapkan oleh Kementerian/Lembaga terkait. PSE Rendah: ISO 27001 atau Indeks KAMI (Peraturan Badan BSSN No. 8 Tahun 2020 – Bab IV Pasal 9) Sanksi Teguran tertulis, setelah bila ditemukan adanya pelanggaran. (Peraturan Badan BSSN No. 8 Tahun 2020 – Bab VI Pasal 37)
  • 15. How to Implement ISO 27001? The organization shall determine the boundaries and applicability of the ISMS to establish its scope. Don’t forget to refer to the regulations. Identify the Scope Which aspect(s)? Top-tier direction Fulfill requirements Review & improve! Top Management shall demonstrate leadership and commitment with respect to the ISMS by doing 8 points of activities. Top Management Commitment There are 26 Requirements plus 114 Clauses/Annex shall be followed (implemented), which most of them are mandatory requirements. Implement Requirements & Clauses/Annex Check/recheck implementation and practice using activities called audits (regular or annual) that lead to a stronger ISMS practices. Audits & Get Certified
  • 16.
  • 17. The Dimensions Modelling This includes the information created, managed and used in the course of organization’s needs, also the use of technologies that support and enable that system. Information & Technology This ranges from formal contracts with clear separation of responsibilities, to flexible partnerships where they share common goals and risks and collaborate to achieve desired outcomes. Partners & Suppliers The organization also needs a culture that supports its objectives, and the right level of capacity and competency among its workforce also motivate people to work in desirable ways. Organizations & People It refers to the daily activities, workflows, controls, and procedures needed to achieve organization’s objectives. Value Streams & Processes
  • 18. Some Existing Key Implementations 1. The Risk Assessment & Register InfoSec Annex 6.1.2 & 6.1.3 Req. 4.1 Req. 5.1 & 5.2 Req. 5.3 Annex 12.1.3 Annex 12.1.2 Annex 16.1.1 & 16.1.5 IT Service Chapter 2.5.3 & 5.1.10 Chapter 3.5 Chapter 4.3.4 Chapter 4.4.1 Chapter 5.2.3 Chapter 5.2.4 Chapter 5.2.5 2. Internal & External Factors 3. Top Management Leadership and Commitment 4. Organizational Roles, Responsibilities and Authorities 5. Capacity Management 6. Change Management 7. Incident Management Part I
  • 19. Some Existing Key Implementations 8. Asset Register InfoSec Annex 8.1.1 & 8.1.2 Annex 12.4.1 – 12.4.3 Annex 16.1.2 & 16.1.4 Annex 14.2.1 – 14.2.9 IT Service Chapter 5.2.6 Chapter 5.2.7 Chapter 5.2.7 Chapter 5.3.3 9. Logs Monitoring 10. Event Management 11. Software Development Part II
  • 20. Some ISMS Important Notes for ITSM 1. Deploy Information Security Policies, Targets and How to Achieve Them 2. Register their assets, risks & their treatments thoroughly 3. Define the needed human resources, their competencies & integrity agreements 4. Raise and monitor the employees’ awareness on securing information & its assets 5. Deploy the Information Classification as well as Documented Information Handling 6. Define & conduct the audit or review regularly Fundamentally, based on ISO 27001 Requirements, it will be better for your organization to: 7. Define regulations to the Physical Security, Removable Media Usage, etc.
  • 21. The Continual Improvement [ISO 27001] Requirements 8 [ITIL] 6 Improvement Steps “Do” Phase [ISO 27001] Requirements 9 [ITIL] 6 Improvement Steps “Check” Phase [ISO 27001] Requirements 4 – 7 [ITIL] 6 Improvement Steps “Plan” Phase [ISO 27001] Requirements 10 [ITIL] 6 Improvement Steps “Act” Phase
  • 23. Let’s Rewind to Chapter 1 of PP No. 71 Year 2019 About the “General Requirements”
  • 24. Which Thought that Never Come in Your Mind? Shut your mouth, our data is not that important! Confidentiality Don't worry, nothing will happen, don't overthink about it! Integrity Hey listen, our system is very sophisticated and safe! Availability ISO is a risk-based thinking. So please, minimize those low-awareness thoughts!!!
  • 25. These Are the Real Advantages ISO 20000-1 (IT Service Management) ISO 27701 (Personal Information MS); ISO 27032 (Cybersecurity); ISO 27017 (InfoSec for Cloud Computing) ISO 27018 (Privacy in Cloud Computing); ISO 27033 (IT Network Security); ISO 27045 (Big Data Security & Privacy); ISO 27400 (Security & Privacy for IoT). Extending the Compliances & Protections Obey and comply with state regulations that have important impacts on maintaining information security on a national scale. Upholding Our Country’s Nationalism Having an ISMS certified by an accredited certification body is concrete evidence that your organization is in a strong position for paying attention their internal/external needs. Strengthen the Confidence of IT Service Users Organizations & people, information & technology, value stream & processes, partners & suppliers will be encapsuled with ISMS mindset. Strengthen the 4-dimension Modelling
  • 26. Wait, There Are Some Hidden Advantages! It is about the continual processes of delivering fast and reliable IT service Information Technology Infrastructure Library (ITIL) IT Service It is about the continual processes of securing the information assets International Organization for Standardization (ISO) 27001 Information Security + (Pasal 3 PP. No. 71 year 2019) = Reliable + Secure
  • 27. The Never-ending (Good) Improvements Strive to be diligent in reviewing your password and PIN usage, is it strong enough? Avoid spreading sensitive and confidential information/data without control, especially on social media. For You, Your Family, and Your Organization Use the appropriate method when destroying unused document or information. Pay attention to your surroundings when processing important or sensitive information. Be patient, don’t be easily attracted by tempting and suspicious offers. Strive to be diligent in reviewing any kind of transactions, as well as login or logout history. Strive diligently to review the availability and security status of your valuable information assets. Strive to be diligent in educating yourself related to information security. Learn, then implement improvements every time you faced information security incidents
  • 28. “A person who constantly care about any possible information security threats & risks in order to maintain the reputation of you or your organization, don’t mock them!” Febryan Alandiestya
  • 29. “Security is a process, not a product” Bruce Schneier (A famous American cryptographer, computer security professional, privacy specialist, and writer)
  • 30. TERIMA KASIH matur suwun | ‫شكرا‬ | thank you | 謝謝 | hatur nuhun | merci Febryan A. A.
  • 31. Stay Connected With Us! t.me/itil_id ITIL Indonesia ITIL Indonesia ITIL Indonesia @itil_indonesia @itil_id ITIL Indonesia Scan here!