SlideShare a Scribd company logo
1 of 8
Download to read offline
Contents
! β€ˆ Overview
! β€ˆ Pre Engagement Scenario
! β€ˆ we45 Proposed Solution
! β€ˆ Post Engagement Scenario
Overview
! β€ˆ As the only Company offering products for extra high voltage data and power
transmission, our client is positioned strongly in high growth geographies and high
growth industries.
! β€ˆ Net Revenue: $500 Million
! β€ˆ Centralized IT Services: Firewall & Content Filtering Services, Google Apps, SAP, Cordys,
HRMS.
! β€ˆ Localized IT Services: Local File Server monitoring and maintenance, Backup and
Restoration and Genereic IT Support (daily operations)
! β€ˆ No. of Locations: 9
! β€ˆ Overall IT Employee Strength: 50
! β€ˆ IT Employee Strength per location: 5
Pre - we45- Engagement Scenario
! β€ˆ ISO 27001 was a critical requirement for the organization from a global market reach
perspective.
! β€ˆ Non – Standard IT operational procedure across the group
! β€ˆ Low levels of awareness and understanding on Information Security and ISO 27001
requirements across the group and departments.
! β€ˆ Non availability of dedicated resources for the ISO 27001 implementation.
! β€ˆ Lack of in-house technical security competency.
! β€ˆ Streamlining of existing standard operating procedures was a challenge as each of the 9
locations were following their own standard operating procedure.
! β€ˆ Existing Information Security Policies & Procedures (ISPP) were ineffective and lacked
technical granularity.
we45 Proposed Solution
! β€ˆ Conducting of a comprehensive workshop on ISO/IEC 27001:2005
! β€ˆ Identification of an appropriate and effective Scope for the ISO 27001
! β€ˆ Conducting an IT Risk Assessment based on the OCTAVE Methodology to identify critical assets
and drafting of a Risk Mitigation Plan for the identifed asset –risk values.
! β€ˆ Preparation of a Statement of Applicability based on the agreed controls applicable and
identified in the Risk Mitigation Plan
! β€ˆ Amendment of the existing Information Security Policies & Procedures (ISPP) in aligment to the
ISO 27001 mandates and ensuring that they map to the controls identified earlier on.
! β€ˆ Technical Assessment (Vulnerability Assessment / Penetration Test) conducted for all 9 locations
on sampled critical information assets and services.
! β€ˆ Implementation of the ISO/IEC 27001:2005 suggested controls and generation of evidences.
! β€ˆ Comprehensive ISO/IEC 27001:2005 based (pre-certification) Internal Audit.
Implementation – Activity Chart
Activities performed No of we45
Consultants
Effort (in
Working
Days)
Deliverables
1.β€ˆ Understand Business Environment
2.β€ˆ ISMS Scope Definition & Documentation
3.β€ˆ Setting up of Security Steering Committee 2 7
1.β€ˆ ISMS Scope Documentation
2.β€ˆ Org. specific high level security policy statement
1.β€ˆ Risk Assessment
2.β€ˆ Technical VAPT
3.β€ˆ Gap Analysis as per ISO/IEC 27001:2005 guidelines
4.β€ˆ Asset Identification, Valuation & Classification
5.β€ˆ SOA (Statement of Applicability)
2 15
1.β€ˆ Risk Assessment Reports
2.β€ˆ VAPT Reports
3.β€ˆ Gap Analysis Report
4.β€ˆ Asset Register
5.β€ˆ SOA.
Create / Review / Amend Policies & Procedures.
1 30
ISO/IEC 27001:2005 Information Security Policy and
Procedure deck.
ISO/IEC 27001 Implementation Workshops.
1 15
ISO/IEC 27001:2005 Awareness & Implementation
Manual
ISO/IEC 27001:2005 Internal Audit and
Preparation , Follow up & closure of CAPA.
1 7
ISO/IEC 27001:2005 Internal Audit Plan & Report
Post Engagement Scenario
! β€ˆ A successful attainment of the ISO 27001:2005 certification for 9 location at one-go
! β€ˆ A marked increase in the awareness and knowledge levels of an Information Security
Management System (ISMS) across the organization.
! β€ˆ Enhanced levels of technical, operational and knowledge on Security Best Practices.
! β€ˆ A measurable and repeatable IT Operations Process instilled across the organization at
both the Central and Local entities.
! β€ˆ A sound Incident Management Response and Learning system in place that captures and
reports IT and Non IT security incidents. This is followed up by a root cause analysis,
preventive and corrective action mechanisms.
! β€ˆ The Sales and Marketing team able to showcase the mature and secure IT practices at
the organization to the global partner and client network
Thank You

More Related Content

What's hot

Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfLakshy Management Consultant Pvt Ltd
Β 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
Β 
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Schellman & Company
Β 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
Β 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
Β 
Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018Schellman & Company
Β 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
Β 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013Ramiro Cid
Β 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questionshimalya sharma
Β 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTsSchellman & Company
Β 
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...PECB
Β 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedJisc
Β 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
Β 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001qualitysummit
Β 
Iso 27001 lead implementer training
Iso 27001 lead implementer trainingIso 27001 lead implementer training
Iso 27001 lead implementer trainingInfosecTrain
Β 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
Β 

What's hot (20)

Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Β 
Iso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 lowIso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 low
Β 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
Β 
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Β 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Β 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
Β 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Β 
Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018Privacy in the Cloud- Introduction to ISO 27018
Privacy in the Cloud- Introduction to ISO 27018
Β 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
Β 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
Β 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
Β 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
Β 
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
Β 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
Β 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
Β 
Integrating Multiple IT Security Standards
Integrating Multiple IT Security StandardsIntegrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
Β 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
Β 
Iso 27001 lead implementer training
Iso 27001 lead implementer trainingIso 27001 lead implementer training
Iso 27001 lead implementer training
Β 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
Β 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
Β 

Viewers also liked

ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web SecuritySharePointRadi
Β 
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.  Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India. cnetworks
Β 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsDenim Group
Β 
Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Denim Group
Β 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
Β 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodologyCahyo Darujati
Β 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan Usman Khan
Β 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
Β 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
Β 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
Β 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
Β 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentSirius
Β 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
Β 

Viewers also liked (16)

ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
Β 
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.  Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Β 
persentation
persentationpersentation
persentation
Β 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
Β 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source Tools
Β 
Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)
Β 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Β 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
Β 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan
Β 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Β 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Β 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
Β 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
Β 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Β 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability Assessment
Β 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
Β 

Similar to we45 ISO-27001 Case Study

english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxssuser00d6eb
Β 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingOperational Excellence Consulting
Β 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
Β 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
Β 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
Β 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001Dipin Sharma
Β 
STAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSTAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSchellman & Company
Β 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
Β 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
Β 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
Β 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
Β 
ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training Drew Kahrs
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NA Putra
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
Β 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
Β 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
Β 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
Β 
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...ITIL Indonesia
Β 

Similar to we45 ISO-27001 Case Study (20)

english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
Β 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
Β 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
Β 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
Β 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
Β 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Β 
STAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSTAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 Certified
Β 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
Β 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
Β 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
Β 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
Β 
ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training ISO 27001 Lead Auditor with Net Security Training
ISO 27001 Lead Auditor with Net Security Training
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
Β 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
Β 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
Β 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
Β 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
Β 
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
Β 
Iso 27001 isms - white paper
Iso 27001   isms -   white paperIso 27001   isms -   white paper
Iso 27001 isms - white paper
Β 
Ebsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal PresentationEbsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal Presentation
Β 

Recently uploaded

9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Availablenitugupta1209
Β 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCRthapariya601
Β 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...riyaescorts54
Β 
Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”Lipikasharma29
Β 
Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)ayushiverma1100
Β 
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts ServiceFULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts ServiceCALLGIRLS DELHI
Β 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...aakahthapa70
Β 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncrthapariya601
Β 
Call Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vip
Call Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vipCall Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vip
Call Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vipAyesha Khan
Β 
Call Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash Payment
Call Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash PaymentCall Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash Payment
Call Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash Paymentaakahthapa70
Β 
Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712Delhi Escorts Service
Β 
Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”Lipikasharma29
Β 
9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncrthapariya601
Β 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncrthapariya601
Β 
πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...
πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...
πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...monikaservice1
Β 
9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncrthapariya601
Β 
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...aakahthapa70
Β 
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)riyaescorts54
Β 
Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”
Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”
Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”Ayesha Khan
Β 

Recently uploaded (20)

9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
Β 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
Β 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Β 
Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Chattarpur Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Β 
Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 β‰Ό Call Girls In Sarojini Nagar (Delhi)
Β 
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts ServiceFULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
Β 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Β 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
Β 
Call Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vip
Call Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vipCall Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vip
Call Girls in Lahore || 03081633338 || 50+ ❀️ Sexy Girls Babes for Sexual - vip
Β 
Call Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket Delhi
Call Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket DelhiCall Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket Delhi
Call Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket Delhi
Β 
Call Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash Payment
Call Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash PaymentCall Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash Payment
Call Girls In {Aerocity Delhi} 9667938988 Cheap Price Your Budget & Cash Payment
Β 
Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 29, (Gurgaon) Call Us. 9711911712
Β 
Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Call Girls in Paharganj Delhi πŸ’― Call Us πŸ”9667422720πŸ”
Β 
9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Moti Nagar Delhi Ncr
Β 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
Β 
πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...
πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...
πŸ”Call Girls In INA Colony Call Us βž₯ 8800357707 In Call Out Call Both With Hig...
Β 
9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Khirki Extension Delhi Ncr
Β 
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Β 
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
Β 
Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”
Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”
Call Girls In Islamabad πŸ’―Call Us πŸ”03090999379πŸ”
Β 

we45 ISO-27001 Case Study

  • 1.
  • 2. Contents ! β€ˆ Overview ! β€ˆ Pre Engagement Scenario ! β€ˆ we45 Proposed Solution ! β€ˆ Post Engagement Scenario
  • 3. Overview ! β€ˆ As the only Company offering products for extra high voltage data and power transmission, our client is positioned strongly in high growth geographies and high growth industries. ! β€ˆ Net Revenue: $500 Million ! β€ˆ Centralized IT Services: Firewall & Content Filtering Services, Google Apps, SAP, Cordys, HRMS. ! β€ˆ Localized IT Services: Local File Server monitoring and maintenance, Backup and Restoration and Genereic IT Support (daily operations) ! β€ˆ No. of Locations: 9 ! β€ˆ Overall IT Employee Strength: 50 ! β€ˆ IT Employee Strength per location: 5
  • 4. Pre - we45- Engagement Scenario ! β€ˆ ISO 27001 was a critical requirement for the organization from a global market reach perspective. ! β€ˆ Non – Standard IT operational procedure across the group ! β€ˆ Low levels of awareness and understanding on Information Security and ISO 27001 requirements across the group and departments. ! β€ˆ Non availability of dedicated resources for the ISO 27001 implementation. ! β€ˆ Lack of in-house technical security competency. ! β€ˆ Streamlining of existing standard operating procedures was a challenge as each of the 9 locations were following their own standard operating procedure. ! β€ˆ Existing Information Security Policies & Procedures (ISPP) were ineffective and lacked technical granularity.
  • 5. we45 Proposed Solution ! β€ˆ Conducting of a comprehensive workshop on ISO/IEC 27001:2005 ! β€ˆ Identification of an appropriate and effective Scope for the ISO 27001 ! β€ˆ Conducting an IT Risk Assessment based on the OCTAVE Methodology to identify critical assets and drafting of a Risk Mitigation Plan for the identifed asset –risk values. ! β€ˆ Preparation of a Statement of Applicability based on the agreed controls applicable and identified in the Risk Mitigation Plan ! β€ˆ Amendment of the existing Information Security Policies & Procedures (ISPP) in aligment to the ISO 27001 mandates and ensuring that they map to the controls identified earlier on. ! β€ˆ Technical Assessment (Vulnerability Assessment / Penetration Test) conducted for all 9 locations on sampled critical information assets and services. ! β€ˆ Implementation of the ISO/IEC 27001:2005 suggested controls and generation of evidences. ! β€ˆ Comprehensive ISO/IEC 27001:2005 based (pre-certification) Internal Audit.
  • 6. Implementation – Activity Chart Activities performed No of we45 Consultants Effort (in Working Days) Deliverables 1.β€ˆ Understand Business Environment 2.β€ˆ ISMS Scope Definition & Documentation 3.β€ˆ Setting up of Security Steering Committee 2 7 1.β€ˆ ISMS Scope Documentation 2.β€ˆ Org. specific high level security policy statement 1.β€ˆ Risk Assessment 2.β€ˆ Technical VAPT 3.β€ˆ Gap Analysis as per ISO/IEC 27001:2005 guidelines 4.β€ˆ Asset Identification, Valuation & Classification 5.β€ˆ SOA (Statement of Applicability) 2 15 1.β€ˆ Risk Assessment Reports 2.β€ˆ VAPT Reports 3.β€ˆ Gap Analysis Report 4.β€ˆ Asset Register 5.β€ˆ SOA. Create / Review / Amend Policies & Procedures. 1 30 ISO/IEC 27001:2005 Information Security Policy and Procedure deck. ISO/IEC 27001 Implementation Workshops. 1 15 ISO/IEC 27001:2005 Awareness & Implementation Manual ISO/IEC 27001:2005 Internal Audit and Preparation , Follow up & closure of CAPA. 1 7 ISO/IEC 27001:2005 Internal Audit Plan & Report
  • 7. Post Engagement Scenario ! β€ˆ A successful attainment of the ISO 27001:2005 certification for 9 location at one-go ! β€ˆ A marked increase in the awareness and knowledge levels of an Information Security Management System (ISMS) across the organization. ! β€ˆ Enhanced levels of technical, operational and knowledge on Security Best Practices. ! β€ˆ A measurable and repeatable IT Operations Process instilled across the organization at both the Central and Local entities. ! β€ˆ A sound Incident Management Response and Learning system in place that captures and reports IT and Non IT security incidents. This is followed up by a root cause analysis, preventive and corrective action mechanisms. ! β€ˆ The Sales and Marketing team able to showcase the mature and secure IT practices at the organization to the global partner and client network