Discover why 50,000 professionals have already switched to easy2comply_Information Security Management
Presentation ObjectiveProvide an overview of our Information Security building blocksOffer insight into the look and feel of the applicationShowcase how you can easily use our software2
Who is it for?Our Information Security software has been designed with the needs of the Chief Information Security Officer in mind and can be used by:Information Security Steering CommitteeInformation Security ManagersInformation Technology Managers3No project is too big or too smallIt can be used by small groups (1 – 5 users) all the way up to the whole enterprise (10,000 users)Implementing our software has never been easier!
Information Security Management4Assets and UnitsThreats and Controls AssessmentSecurity IncidentsTasks, Notifications and MessagesReports and Management Dashboards
Assets and Units5Assets and UnitsThreats and Controls AssessmentSecurity IncidentsTasks, Notifications and MessagesYou can also look at your tree horizontally across the enterprise. This feature allows you to drag and drop parts of your tree into simple structures to ease reporting and comparative analysis.This is where you define your organizational tree. Our software combines a dual hierarchy: one for your assets, units and locations, and one for your information security  activities and procedures.Reports and Management Dashboards
Assets and Units6Each item can be documented in terms of Owner, Type, Asset Value and AttachmentsStructure can be built with no limitation to the number of levels
Assets and UnitsTasks, Notifications and MessagesReports and Management DashboardsThreats and Controls Assessment7Assess your Threats using one or more of the available methodologies:Impact vs. Likelihood Risk Square2) QuestionnaireThreats and Controls AssessmentSecurity IncidentsMitigate your Threats by linking relevant controls to specific Threats.Check the controls for their level of effectiveness.Schedule the control checking process.Identify your Threats within the Asset or Unit.Document, categorize and classify the vulnerabilities.Attach any supporting evidence to the risk record.
Assessment Flow8IdentifyAssessControlImpact
Likelihood
Risk Score
Control Mapping
Auditing
Remediation
Threats
Risk Description
VulnerabilitiesThreat Identification9Identify and assess all of the relevant Threats
Threat Assessment10Vulnerabilities needs to be mapped to the relevant Threat.Assessment performed according the CIA-based questionnaire or Impact vs. Likelihood.
Control Mapping11Here you can see the Threat……together with the associated set of Controls mapped to the Threat.
Assets and UnitsThreat and Controls AssessmentTasks, Notifications and MessagesReports and Management DashboardsSecurity Incidents12Capture your Security Incidents and other Event Data across your TreeSecurity IncidentsAssess the impact of the Incident and link each impact to your Threat and Control mapRespond effectively to each Incident, draw relevant conclusions and allocate Actions accordingly
Incident Management13RecordDamageLesson LearnedMultiple Impacts
Total Damage
Indirect Impacts
Improvement Plan

Online Training Information Security Management

  • 1.
    Discover why 50,000professionals have already switched to easy2comply_Information Security Management
  • 2.
    Presentation ObjectiveProvide anoverview of our Information Security building blocksOffer insight into the look and feel of the applicationShowcase how you can easily use our software2
  • 3.
    Who is itfor?Our Information Security software has been designed with the needs of the Chief Information Security Officer in mind and can be used by:Information Security Steering CommitteeInformation Security ManagersInformation Technology Managers3No project is too big or too smallIt can be used by small groups (1 – 5 users) all the way up to the whole enterprise (10,000 users)Implementing our software has never been easier!
  • 4.
    Information Security Management4Assetsand UnitsThreats and Controls AssessmentSecurity IncidentsTasks, Notifications and MessagesReports and Management Dashboards
  • 5.
    Assets and Units5Assetsand UnitsThreats and Controls AssessmentSecurity IncidentsTasks, Notifications and MessagesYou can also look at your tree horizontally across the enterprise. This feature allows you to drag and drop parts of your tree into simple structures to ease reporting and comparative analysis.This is where you define your organizational tree. Our software combines a dual hierarchy: one for your assets, units and locations, and one for your information security activities and procedures.Reports and Management Dashboards
  • 6.
    Assets and Units6Eachitem can be documented in terms of Owner, Type, Asset Value and AttachmentsStructure can be built with no limitation to the number of levels
  • 7.
    Assets and UnitsTasks,Notifications and MessagesReports and Management DashboardsThreats and Controls Assessment7Assess your Threats using one or more of the available methodologies:Impact vs. Likelihood Risk Square2) QuestionnaireThreats and Controls AssessmentSecurity IncidentsMitigate your Threats by linking relevant controls to specific Threats.Check the controls for their level of effectiveness.Schedule the control checking process.Identify your Threats within the Asset or Unit.Document, categorize and classify the vulnerabilities.Attach any supporting evidence to the risk record.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
    VulnerabilitiesThreat Identification9Identify andassess all of the relevant Threats
  • 17.
    Threat Assessment10Vulnerabilities needsto be mapped to the relevant Threat.Assessment performed according the CIA-based questionnaire or Impact vs. Likelihood.
  • 18.
    Control Mapping11Here youcan see the Threat……together with the associated set of Controls mapped to the Threat.
  • 19.
    Assets and UnitsThreatand Controls AssessmentTasks, Notifications and MessagesReports and Management DashboardsSecurity Incidents12Capture your Security Incidents and other Event Data across your TreeSecurity IncidentsAssess the impact of the Incident and link each impact to your Threat and Control mapRespond effectively to each Incident, draw relevant conclusions and allocate Actions accordingly
  • 20.
  • 21.
  • 22.
  • 23.