SlideShare uma empresa Scribd logo
1 de 20
Welcome to presentation
                  by



NETPECKERS CONSULTING (P) LTD.


An ISO 9001:2000 compliant organization
                  Sanjay Punjabi
   Lead Auditor ISO 9001:2000, ISO 14001:2004,
                      BS-
   OHSAS 18001:1999, BS-7799, ISO 22000:2005,
                 ISO 27001:2005


                     On
Direct & Indirect Advantages of implementing
    ISO 27001:2005 in your organization
                                      DURATION 25 MINUTES.
What Is ISO 27001?

 ISO 27001, titled "Information Security
 Management - Specification With Guidance for
 Use", is the replacement for BS7799-2. It is
 intended to provide the foundation for third
 party audit, and is 'harmonized' with other
 management standards, such as ISO 9001 and
 ISO 14001.
Objective of the standard

 The basic objective of the standard is to help
 establish and maintain an effective information
 management system, using a continual
 improvement approach. It implements OECD
 (Organization for Economic Cooperation and
 Development) principles, governing security of
 information and network systems.
The Contents of the Standard?

 The broad content is of course similar to the
 old BS7799. Included is:
 Cross reference with ISO 17799 controls
 Use of PDCA
 Information Management System
 Terms and definitions
1) When was ISO 27001 published?

 In October 2005, although a final draft version
 was published some months prior to this.
2) Is it related to ISO 17799?

 Yes. It essentially described how to apply the
 controls defined within ISO 17799, and of
 course how to build and maintain and ISMS.
ISMS –INFORMATION SECURITY
  MANAGEMENT SYSTEM
Types of Information

  Printed or written on paper
  Stored electronically
  Transmitted by post or using electronic means
  Shown on corporate videos
  Verbal-spoken in conversations
‘….Whatever form the information takes, or means by
  which it is shared or stored, it should always be
  appropriately protected’(ISO 17799:2005)
What is Information Security

ISO 27001:2005 defines this as:
  Confidentiality : the property that information is not
  made available or disclosed to unauthorized
  individuals,   entities(programs),    or    processes
  (superceding processes)
  Integrity : the property of safeguarding the accuracy
  and completeness of assets.
  Availability : the property of being accessible and
  usable upon demand by an authorized entity.
In some organizations, integrity and/or
availability may be more important than
confidentiality.
Role of ISMS

 Information security protects information from a
 wide range of threats in order to ensure
 business      continuity, minimize      business
 damage and maximize return on investment
 and business opportunities.
 Every organization will have a differing set of
 requirements in terms of control requirements
 and the level of confidentiality, integrity and
 availability.
Eight Management Principles

1.   Customer focus
2.   Leadership
3.   Involvement of people
4.   Process approach
5.   System approach to management
6.   Continual improvement
7.   Factual approach to decision making
8.   Mutually beneficial supplier relationship.
Management Process Model
              Continual Improvement of the Management System




                                  Plan
 Interested                                                    Interested
                              Establish ISMS
   Parties                                                       Parties

 Information
   Security                                Measurement
Requirements     Do   Implement &
                                           Analysis &
                                                         Act    Managed
     And              operate the ISMS     Improvement         Information
 expectations                                                    Security


                                Monitor &
                             Review the ISMS
                                  Check
Risks and Threats to Information
Systems

 High User knowledge of IT system.
 Theft, Sabotage, Misuse, Hacking.
 Version control problems.
 Unrestricted access.
 Systems/ network failure
 Lack of documentation
 Virus
 Natural calamities
 Fire

              ISMS Internal Auditor Course
                    Session -1 , V-1
Information Security – General trends

 20% of large organizations that had an incident took more than a
 week to get business operations back to normal.
 “Virus infection was the single largest cause of serious security
 breaches.”
 44% of UK business have suffered at least one malicious security
 breach in the year 2001. Average cost of a serious security
 incident was £30,000.
 “Only 27% UK companies have documented security policy.”
 “Only 33% of UK web-site have software in place to detect
 intrusion.”

    INFORMATION SECURITY BREACHES SURVEY 2002


                 ISMS Internal Auditor Course
                       Session -1 , V-1
Information Security – General trends
contd…

 Issues at a glance
   Ninety percent of organizations say information
   security is of high importance for achieving their
   overall objectives.
   Seventy-eight percent of organizations identify risk
   reduction as their top influence for information
   security spending.

  Source: Global Information Security Survey 2003 by
   Ernst &Young.
              ISMS Internal Auditor Course
                    Session -1 , V-1
Information Security- General trends
contd…
 However
  –   More than 34% of organizations rate themselves as less than adequate in their ability to
      determine whether their systems are currently under attack.
  –   More than 33% of organizations say they are inadequate in their ability to respond to
      incidents.
  –   Only 34% of organizations claim to be compliant with applicable security –driven
      regulations.
  –   Fifty six percent of organizations cite insufficient budget as the number one obstacle to an
      effective information security posture.
  –   Nearly 60% of organizations say they rarely or never calculate ROI for information
      security spending.
  –   Only 29% of organizations list employee awareness and training as a top area of
      information security spending, compared with 83% of organizations that list technology as
      their top information security spending area.
  –   Only 35% of organizations say they have continuous education and awareness programs.
                 Source: Global Information Security Survey 2003 by Ernst &Young.




                         ISMS Internal Auditor Course
                               Session -1 , V-1
Result ?????

 Uncertainty over issues such as
 –   Availability
        Is information accessible wherever and whenever required?
 –   Integrity
        Is information sufficiently right for the purpose at the time of use?
 –   Confidentiality
        Is information available only to those who are authorised to
        access IT?

      This is likely to result in lower trust levels.
And the Challenge is …
 Protection of Information and Information Systems to meet Business and
 Legal Requirement by
 Provision and demonstration of secure environment to clients.
 Managing security between projects from competing clients
 Preventing loss of product knowledge to external attacks, Internal thefts
 Preventing Leak of confidential information to competition.
 Meeting Parent company requirements
 Ease of access to large mobile work force.
 Providing access to customers where off site development is undertaken
 with the client.
 Introduction of new technologies and tools
 Managing costs Vs risk
 Managing Legal compliance.
Thank you for joining in the presentation
    Please fill in the feedback form
Which would help us to be more precise
              In our efforts.



         Sanjay Punjabi
         Certified Auditor
         san@netpeckers.net
         M-9426077684




    An ISO 9001:2000 compliant organization

Mais conteúdo relacionado

Mais procurados

How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
Hanaysha
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...
padler01
 

Mais procurados (20)

How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and Developments
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
 
Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Role management
Role managementRole management
Role management
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 

Semelhante a Iso 27001 2005- by netpeckers consulting

NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
NA Putra
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Taiye Lambo
 

Semelhante a Iso 27001 2005- by netpeckers consulting (20)

ADDRESSING CORPORATE CONCERNS
ADDRESSING CORPORATE CONCERNSADDRESSING CORPORATE CONCERNS
ADDRESSING CORPORATE CONCERNS
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
Enhancing Cybersecurity with VAPT for IT Industries and ISO 27001 Compliant O...
 
Information security
Information securityInformation security
Information security
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 

Mais de Iskcon Ahmedabad

Corporate trainings offered by V-Serve in brief
Corporate trainings offered by V-Serve in briefCorporate trainings offered by V-Serve in brief
Corporate trainings offered by V-Serve in brief
Iskcon Ahmedabad
 
Microsoft PowerPoint - Stress Management based on vedic wisdom
Microsoft PowerPoint - Stress Management based on vedic wisdomMicrosoft PowerPoint - Stress Management based on vedic wisdom
Microsoft PowerPoint - Stress Management based on vedic wisdom
Iskcon Ahmedabad
 
Cardio pulmonary resuscitation training hand book
Cardio pulmonary resuscitation training hand bookCardio pulmonary resuscitation training hand book
Cardio pulmonary resuscitation training hand book
Iskcon Ahmedabad
 
Haccp consulting and training by Netpeckers Consulting
Haccp consulting and training by Netpeckers ConsultingHaccp consulting and training by Netpeckers Consulting
Haccp consulting and training by Netpeckers Consulting
Iskcon Ahmedabad
 

Mais de Iskcon Ahmedabad (16)

Corporate trainings offered by V-Serve in brief
Corporate trainings offered by V-Serve in briefCorporate trainings offered by V-Serve in brief
Corporate trainings offered by V-Serve in brief
 
Microsoft PowerPoint - Stress Management based on vedic wisdom
Microsoft PowerPoint - Stress Management based on vedic wisdomMicrosoft PowerPoint - Stress Management based on vedic wisdom
Microsoft PowerPoint - Stress Management based on vedic wisdom
 
Cardio pulmonary resuscitation training hand book
Cardio pulmonary resuscitation training hand bookCardio pulmonary resuscitation training hand book
Cardio pulmonary resuscitation training hand book
 
Consulting & training for Iso 17025 by Netpeckers Consulting
Consulting & training for Iso 17025 by Netpeckers ConsultingConsulting & training for Iso 17025 by Netpeckers Consulting
Consulting & training for Iso 17025 by Netpeckers Consulting
 
Consulting & training for Ce marking for medical devices by netpeckers consul...
Consulting & training for Ce marking for medical devices by netpeckers consul...Consulting & training for Ce marking for medical devices by netpeckers consul...
Consulting & training for Ce marking for medical devices by netpeckers consul...
 
Consulting & training to achieve Ce marking by netpeckers consulting
Consulting & training to achieve Ce marking by netpeckers consultingConsulting & training to achieve Ce marking by netpeckers consulting
Consulting & training to achieve Ce marking by netpeckers consulting
 
SA 8000 training and consulting by Netpeckers Consulting
SA 8000 training and consulting by Netpeckers ConsultingSA 8000 training and consulting by Netpeckers Consulting
SA 8000 training and consulting by Netpeckers Consulting
 
How to implement 5S - Japanese technique presentation by netpeckers managemen...
How to implement 5S - Japanese technique presentation by netpeckers managemen...How to implement 5S - Japanese technique presentation by netpeckers managemen...
How to implement 5S - Japanese technique presentation by netpeckers managemen...
 
Ohsas 18001 2007 by ncpl
Ohsas 18001 2007 by ncplOhsas 18001 2007 by ncpl
Ohsas 18001 2007 by ncpl
 
Ebrochure netpeckers p ltd, ahmedabad, Gujarat, India
Ebrochure netpeckers p ltd, ahmedabad, Gujarat, IndiaEbrochure netpeckers p ltd, ahmedabad, Gujarat, India
Ebrochure netpeckers p ltd, ahmedabad, Gujarat, India
 
Ebrochure netpeckers
Ebrochure netpeckersEbrochure netpeckers
Ebrochure netpeckers
 
Haccp consulting and training by Netpeckers Consulting
Haccp consulting and training by Netpeckers ConsultingHaccp consulting and training by Netpeckers Consulting
Haccp consulting and training by Netpeckers Consulting
 
Consulting for Iso 22000 By Netpeckers Consulting
Consulting for Iso 22000 By Netpeckers ConsultingConsulting for Iso 22000 By Netpeckers Consulting
Consulting for Iso 22000 By Netpeckers Consulting
 
TS/ISO 16949 consulting by Netpeckers Consulting India
TS/ISO 16949 consulting by Netpeckers Consulting IndiaTS/ISO 16949 consulting by Netpeckers Consulting India
TS/ISO 16949 consulting by Netpeckers Consulting India
 
Iso 14001 consulting by Netpeckers Consulting India
Iso 14001 consulting by Netpeckers Consulting IndiaIso 14001 consulting by Netpeckers Consulting India
Iso 14001 consulting by Netpeckers Consulting India
 
Iso 9001 2008 consulting by Netpeckers Consulting India
Iso 9001 2008  consulting by Netpeckers Consulting IndiaIso 9001 2008  consulting by Netpeckers Consulting India
Iso 9001 2008 consulting by Netpeckers Consulting India
 

Iso 27001 2005- by netpeckers consulting

  • 1. Welcome to presentation by NETPECKERS CONSULTING (P) LTD. An ISO 9001:2000 compliant organization Sanjay Punjabi Lead Auditor ISO 9001:2000, ISO 14001:2004, BS- OHSAS 18001:1999, BS-7799, ISO 22000:2005, ISO 27001:2005 On Direct & Indirect Advantages of implementing ISO 27001:2005 in your organization DURATION 25 MINUTES.
  • 2. What Is ISO 27001? ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS7799-2. It is intended to provide the foundation for third party audit, and is 'harmonized' with other management standards, such as ISO 9001 and ISO 14001.
  • 3. Objective of the standard The basic objective of the standard is to help establish and maintain an effective information management system, using a continual improvement approach. It implements OECD (Organization for Economic Cooperation and Development) principles, governing security of information and network systems.
  • 4. The Contents of the Standard? The broad content is of course similar to the old BS7799. Included is: Cross reference with ISO 17799 controls Use of PDCA Information Management System Terms and definitions
  • 5. 1) When was ISO 27001 published? In October 2005, although a final draft version was published some months prior to this.
  • 6. 2) Is it related to ISO 17799? Yes. It essentially described how to apply the controls defined within ISO 17799, and of course how to build and maintain and ISMS.
  • 7. ISMS –INFORMATION SECURITY MANAGEMENT SYSTEM
  • 8. Types of Information Printed or written on paper Stored electronically Transmitted by post or using electronic means Shown on corporate videos Verbal-spoken in conversations ‘….Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected’(ISO 17799:2005)
  • 9. What is Information Security ISO 27001:2005 defines this as: Confidentiality : the property that information is not made available or disclosed to unauthorized individuals, entities(programs), or processes (superceding processes) Integrity : the property of safeguarding the accuracy and completeness of assets. Availability : the property of being accessible and usable upon demand by an authorized entity.
  • 10. In some organizations, integrity and/or availability may be more important than confidentiality.
  • 11. Role of ISMS Information security protects information from a wide range of threats in order to ensure business continuity, minimize business damage and maximize return on investment and business opportunities. Every organization will have a differing set of requirements in terms of control requirements and the level of confidentiality, integrity and availability.
  • 12. Eight Management Principles 1. Customer focus 2. Leadership 3. Involvement of people 4. Process approach 5. System approach to management 6. Continual improvement 7. Factual approach to decision making 8. Mutually beneficial supplier relationship.
  • 13. Management Process Model Continual Improvement of the Management System Plan Interested Interested Establish ISMS Parties Parties Information Security Measurement Requirements Do Implement & Analysis & Act Managed And operate the ISMS Improvement Information expectations Security Monitor & Review the ISMS Check
  • 14. Risks and Threats to Information Systems High User knowledge of IT system. Theft, Sabotage, Misuse, Hacking. Version control problems. Unrestricted access. Systems/ network failure Lack of documentation Virus Natural calamities Fire ISMS Internal Auditor Course Session -1 , V-1
  • 15. Information Security – General trends 20% of large organizations that had an incident took more than a week to get business operations back to normal. “Virus infection was the single largest cause of serious security breaches.” 44% of UK business have suffered at least one malicious security breach in the year 2001. Average cost of a serious security incident was £30,000. “Only 27% UK companies have documented security policy.” “Only 33% of UK web-site have software in place to detect intrusion.” INFORMATION SECURITY BREACHES SURVEY 2002 ISMS Internal Auditor Course Session -1 , V-1
  • 16. Information Security – General trends contd… Issues at a glance Ninety percent of organizations say information security is of high importance for achieving their overall objectives. Seventy-eight percent of organizations identify risk reduction as their top influence for information security spending. Source: Global Information Security Survey 2003 by Ernst &Young. ISMS Internal Auditor Course Session -1 , V-1
  • 17. Information Security- General trends contd… However – More than 34% of organizations rate themselves as less than adequate in their ability to determine whether their systems are currently under attack. – More than 33% of organizations say they are inadequate in their ability to respond to incidents. – Only 34% of organizations claim to be compliant with applicable security –driven regulations. – Fifty six percent of organizations cite insufficient budget as the number one obstacle to an effective information security posture. – Nearly 60% of organizations say they rarely or never calculate ROI for information security spending. – Only 29% of organizations list employee awareness and training as a top area of information security spending, compared with 83% of organizations that list technology as their top information security spending area. – Only 35% of organizations say they have continuous education and awareness programs. Source: Global Information Security Survey 2003 by Ernst &Young. ISMS Internal Auditor Course Session -1 , V-1
  • 18. Result ????? Uncertainty over issues such as – Availability Is information accessible wherever and whenever required? – Integrity Is information sufficiently right for the purpose at the time of use? – Confidentiality Is information available only to those who are authorised to access IT? This is likely to result in lower trust levels.
  • 19. And the Challenge is … Protection of Information and Information Systems to meet Business and Legal Requirement by Provision and demonstration of secure environment to clients. Managing security between projects from competing clients Preventing loss of product knowledge to external attacks, Internal thefts Preventing Leak of confidential information to competition. Meeting Parent company requirements Ease of access to large mobile work force. Providing access to customers where off site development is undertaken with the client. Introduction of new technologies and tools Managing costs Vs risk Managing Legal compliance.
  • 20. Thank you for joining in the presentation Please fill in the feedback form Which would help us to be more precise In our efforts. Sanjay Punjabi Certified Auditor san@netpeckers.net M-9426077684 An ISO 9001:2000 compliant organization