SlideShare a Scribd company logo
1 of 8
Download to read offline
Contents
! β€ˆ Overview
! β€ˆ Pre Engagement Scenario
! β€ˆ we45 Proposed Solution
! β€ˆ Post Engagement Scenario
Overview
! β€ˆ As the only Company offering products for extra high voltage data and power
transmission, our client is positioned strongly in high growth geographies and high
growth industries.
! β€ˆ Net Revenue: $500 Million
! β€ˆ Centralized IT Services: Firewall & Content Filtering Services, Google Apps, SAP, Cordys,
HRMS.
! β€ˆ Localized IT Services: Local File Server monitoring and maintenance, Backup and
Restoration and Genereic IT Support (daily operations)
! β€ˆ No. of Locations: 9
! β€ˆ Overall IT Employee Strength: 50
! β€ˆ IT Employee Strength per location: 5
Pre - we45- Engagement Scenario
! β€ˆ ISO 27001 was a critical requirement for the organization from a global market reach
perspective.
! β€ˆ Non – Standard IT operational procedure across the group
! β€ˆ Low levels of awareness and understanding on Information Security and ISO 27001
requirements across the group and departments.
! β€ˆ Non availability of dedicated resources for the ISO 27001 implementation.
! β€ˆ Lack of in-house technical security competency.
! β€ˆ Streamlining of existing standard operating procedures was a challenge as each of the 9
locations were following their own standard operating procedure.
! β€ˆ Existing Information Security Policies & Procedures (ISPP) were ineffective and lacked
technical granularity.
we45 Proposed Solution
! β€ˆ Conducting of a comprehensive workshop on ISO/IEC 27001:2005
! β€ˆ Identification of an appropriate and effective Scope for the ISO 27001
! β€ˆ Conducting an IT Risk Assessment based on the OCTAVE Methodology to identify critical assets
and drafting of a Risk Mitigation Plan for the identifed asset –risk values.
! β€ˆ Preparation of a Statement of Applicability based on the agreed controls applicable and
identified in the Risk Mitigation Plan
! β€ˆ Amendment of the existing Information Security Policies & Procedures (ISPP) in aligment to the
ISO 27001 mandates and ensuring that they map to the controls identified earlier on.
! β€ˆ Technical Assessment (Vulnerability Assessment / Penetration Test) conducted for all 9 locations
on sampled critical information assets and services.
! β€ˆ Implementation of the ISO/IEC 27001:2005 suggested controls and generation of evidences.
! β€ˆ Comprehensive ISO/IEC 27001:2005 based (pre-certification) Internal Audit.
Implementation – Activity Chart
Activities performed No of we45
Consultants
Effort (in
Working
Days)
Deliverables
1.β€ˆ Understand Business Environment
2.β€ˆ ISMS Scope Definition & Documentation
3.β€ˆ Setting up of Security Steering Committee 2 7
1.β€ˆ ISMS Scope Documentation
2.β€ˆ Org. specific high level security policy statement
1.β€ˆ Risk Assessment
2.β€ˆ Technical VAPT
3.β€ˆ Gap Analysis as per ISO/IEC 27001:2005 guidelines
4.β€ˆ Asset Identification, Valuation & Classification
5.β€ˆ SOA (Statement of Applicability)
2 15
1.β€ˆ Risk Assessment Reports
2.β€ˆ VAPT Reports
3.β€ˆ Gap Analysis Report
4.β€ˆ Asset Register
5.β€ˆ SOA.
Create / Review / Amend Policies & Procedures.
1 30
ISO/IEC 27001:2005 Information Security Policy and
Procedure deck.
ISO/IEC 27001 Implementation Workshops.
1 15
ISO/IEC 27001:2005 Awareness & Implementation
Manual
ISO/IEC 27001:2005 Internal Audit and
Preparation , Follow up & closure of CAPA.
1 7
ISO/IEC 27001:2005 Internal Audit Plan & Report
Post Engagement Scenario
! β€ˆ A successful attainment of the ISO 27001:2005 certification for 9 location at one-go
! β€ˆ A marked increase in the awareness and knowledge levels of an Information Security
Management System (ISMS) across the organization.
! β€ˆ Enhanced levels of technical, operational and knowledge on Security Best Practices.
! β€ˆ A measurable and repeatable IT Operations Process instilled across the organization at
both the Central and Local entities.
! β€ˆ A sound Incident Management Response and Learning system in place that captures and
reports IT and Non IT security incidents. This is followed up by a root cause analysis,
preventive and corrective action mechanisms.
! β€ˆ The Sales and Marketing team able to showcase the mature and secure IT practices at
the organization to the global partner and client network
Thank You

More Related Content

What's hot

Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfLakshy Management Consultant Pvt Ltd
Β 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
Β 
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Schellman & Company
Β 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
Β 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
Β 
Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018Schellman & Company
Β 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
Β 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013Ramiro Cid
Β 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questionshimalya sharma
Β 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTsSchellman & Company
Β 
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...PECB
Β 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedJisc
Β 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
Β 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001qualitysummit
Β 
Iso 27001 lead implementer training
Iso 27001 lead implementer trainingIso 27001 lead implementer training
Iso 27001 lead implementer trainingInfosecTrain
Β 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
Β 

What's hot (20)

Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Β 
Iso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 lowIso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 low
Β 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
Β 
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Β 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Β 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
Β 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Β 
Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018
Β 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
Β 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
Β 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
Β 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
Β 
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
Β 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
Β 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
Β 
Integrating Multiple IT Security Standards
Integrating Multiple IT Security StandardsIntegrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
Β 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
Β 
Iso 27001 lead implementer training
Iso 27001 lead implementer trainingIso 27001 lead implementer training
Iso 27001 lead implementer training
Β 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
Β 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
Β 

Viewers also liked

ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web SecuritySharePointRadi
Β 
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.  Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India. cnetworks
Β 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsDenim Group
Β 
Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Denim Group
Β 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
Β 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodologyCahyo Darujati
Β 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan Usman Khan
Β 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
Β 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
Β 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
Β 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
Β 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentSirius
Β 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
Β 

Viewers also liked (16)

ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
Β 
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.  Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Β 
persentation
persentationpersentation
persentation
Β 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
Β 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source Tools
Β 
Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)
Β 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Β 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
Β 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan
Β 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Β 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Β 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
Β 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
Β 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Β 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability Assessment
Β 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
Β 

Similar to we45 ISO-27001 Case Study

english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxssuser00d6eb
Β 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingOperational Excellence Consulting
Β 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
Β 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
Β 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
Β 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001Dipin Sharma
Β 
STAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSTAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSchellman & Company
Β 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
Β 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
Β 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
Β 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
Β 
ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training Drew Kahrs
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NA Putra
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
Β 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
Β 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
Β 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
Β 
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...ITIL Indonesia
Β 

Similar to we45 ISO-27001 Case Study (20)

english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
Β 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
Β 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
Β 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
Β 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
Β 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Β 
STAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSTAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 Certified
Β 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
Β 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
Β 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
Β 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
Β 
ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
Β 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
Β 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
Β 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
Β 
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
Β 
Iso 27001 isms - white paper
Iso 27001   isms -   white paperIso 27001   isms -   white paper
Iso 27001 isms - white paper
Β 
Ebsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal PresentationEbsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal Presentation
Β 

Recently uploaded

9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Availablenitugupta1209
Β 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579diyaspanoida
Β 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CNiteshKumar82226
Β 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...riyaescorts54
Β 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000teencall080
Β 
Call US PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...
Call US  PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...Call US  PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...
Call US PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...Pooja Nehwal
Β 
BHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALLBHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALLNiteshKumar82226
Β 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goadelhincr993
Β 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...aakahthapa70
Β 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaDelhi Escorts Service
Β 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...aakahthapa70
Β 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...aakahthapa70
Β 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNiteshKumar82226
Β 
Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...
Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...
Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...Sheetaleventcompany
Β 
Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”
Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”
Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”thapagita
Β 
πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹
πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹
πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹Sheetaleventcompany
Β 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579diyaspanoida
Β 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154NiteshKumar82226
Β 

Recently uploaded (20)

9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
Β 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Β 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA C
Β 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Β 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
Β 
Call US PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...
Call US  PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...Call US  PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...
Call US PoojaπŸ“ž 9892124323 βœ…Call Girls In Mira Road ( Mumbai ) secure service...
Β 
BHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALLBHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALL
Β 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
Β 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Β 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Β 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Β 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Β 
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
Β 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALL
Β 
Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...
Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...
Call Girl Rohini ❀️7065000506 Pooja@ Rohini Call Girls Near Me ❀️♀️@ Sexy Cal...
Β 
Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”
Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”
Call Girls in Majnu ka Tilla Delhi πŸ’― Call Us πŸ”9711014705πŸ”
Β 
πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹
πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹
πŸ’šπŸ˜‹Bangalore Escort Service Call Girls, β‚Ή5000 To 25K With ACπŸ’šπŸ˜‹
Β 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Β 
Goa Call Girls πŸ₯° +91 9540619990 πŸ“Service Girls In Goa
Goa Call Girls πŸ₯° +91 9540619990 πŸ“Service Girls In GoaGoa Call Girls πŸ₯° +91 9540619990 πŸ“Service Girls In Goa
Goa Call Girls πŸ₯° +91 9540619990 πŸ“Service Girls In Goa
Β 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154
Β 

we45 ISO-27001 Case Study

  • 1.
  • 2. Contents ! β€ˆ Overview ! β€ˆ Pre Engagement Scenario ! β€ˆ we45 Proposed Solution ! β€ˆ Post Engagement Scenario
  • 3. Overview ! β€ˆ As the only Company offering products for extra high voltage data and power transmission, our client is positioned strongly in high growth geographies and high growth industries. ! β€ˆ Net Revenue: $500 Million ! β€ˆ Centralized IT Services: Firewall & Content Filtering Services, Google Apps, SAP, Cordys, HRMS. ! β€ˆ Localized IT Services: Local File Server monitoring and maintenance, Backup and Restoration and Genereic IT Support (daily operations) ! β€ˆ No. of Locations: 9 ! β€ˆ Overall IT Employee Strength: 50 ! β€ˆ IT Employee Strength per location: 5
  • 4. Pre - we45- Engagement Scenario ! β€ˆ ISO 27001 was a critical requirement for the organization from a global market reach perspective. ! β€ˆ Non – Standard IT operational procedure across the group ! β€ˆ Low levels of awareness and understanding on Information Security and ISO 27001 requirements across the group and departments. ! β€ˆ Non availability of dedicated resources for the ISO 27001 implementation. ! β€ˆ Lack of in-house technical security competency. ! β€ˆ Streamlining of existing standard operating procedures was a challenge as each of the 9 locations were following their own standard operating procedure. ! β€ˆ Existing Information Security Policies & Procedures (ISPP) were ineffective and lacked technical granularity.
  • 5. we45 Proposed Solution ! β€ˆ Conducting of a comprehensive workshop on ISO/IEC 27001:2005 ! β€ˆ Identification of an appropriate and effective Scope for the ISO 27001 ! β€ˆ Conducting an IT Risk Assessment based on the OCTAVE Methodology to identify critical assets and drafting of a Risk Mitigation Plan for the identifed asset –risk values. ! β€ˆ Preparation of a Statement of Applicability based on the agreed controls applicable and identified in the Risk Mitigation Plan ! β€ˆ Amendment of the existing Information Security Policies & Procedures (ISPP) in aligment to the ISO 27001 mandates and ensuring that they map to the controls identified earlier on. ! β€ˆ Technical Assessment (Vulnerability Assessment / Penetration Test) conducted for all 9 locations on sampled critical information assets and services. ! β€ˆ Implementation of the ISO/IEC 27001:2005 suggested controls and generation of evidences. ! β€ˆ Comprehensive ISO/IEC 27001:2005 based (pre-certification) Internal Audit.
  • 6. Implementation – Activity Chart Activities performed No of we45 Consultants Effort (in Working Days) Deliverables 1.β€ˆ Understand Business Environment 2.β€ˆ ISMS Scope Definition & Documentation 3.β€ˆ Setting up of Security Steering Committee 2 7 1.β€ˆ ISMS Scope Documentation 2.β€ˆ Org. specific high level security policy statement 1.β€ˆ Risk Assessment 2.β€ˆ Technical VAPT 3.β€ˆ Gap Analysis as per ISO/IEC 27001:2005 guidelines 4.β€ˆ Asset Identification, Valuation & Classification 5.β€ˆ SOA (Statement of Applicability) 2 15 1.β€ˆ Risk Assessment Reports 2.β€ˆ VAPT Reports 3.β€ˆ Gap Analysis Report 4.β€ˆ Asset Register 5.β€ˆ SOA. Create / Review / Amend Policies & Procedures. 1 30 ISO/IEC 27001:2005 Information Security Policy and Procedure deck. ISO/IEC 27001 Implementation Workshops. 1 15 ISO/IEC 27001:2005 Awareness & Implementation Manual ISO/IEC 27001:2005 Internal Audit and Preparation , Follow up & closure of CAPA. 1 7 ISO/IEC 27001:2005 Internal Audit Plan & Report
  • 7. Post Engagement Scenario ! β€ˆ A successful attainment of the ISO 27001:2005 certification for 9 location at one-go ! β€ˆ A marked increase in the awareness and knowledge levels of an Information Security Management System (ISMS) across the organization. ! β€ˆ Enhanced levels of technical, operational and knowledge on Security Best Practices. ! β€ˆ A measurable and repeatable IT Operations Process instilled across the organization at both the Central and Local entities. ! β€ˆ A sound Incident Management Response and Learning system in place that captures and reports IT and Non IT security incidents. This is followed up by a root cause analysis, preventive and corrective action mechanisms. ! β€ˆ The Sales and Marketing team able to showcase the mature and secure IT practices at the organization to the global partner and client network