SlideShare uma empresa Scribd logo
1 de 17
Implementation of security standards and procedures
Topics ,[object Object]
Evolution of approach ,[object Object],[object Object],[object Object],[object Object]
Hard facts... ,[object Object],[object Object],[object Object],[object Object]
Data Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Level of (Information)security and  costs Security  level Costs Incidents Security Total 0 100
Common problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cost of security Security level Cost Incidents Information Security Total 0 100 Low High Medium
Pains ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object]
Upcoming challenges ,[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1Hamed Moghaddam
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4MLG College of Learning, Inc
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security ManagementJonathan Coleman
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 

Mais procurados (20)

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
)k
)k)k
)k
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Sec4
Sec4Sec4
Sec4
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 

Destaque

How to market your brand in 2013 and beyond
How to market your brand in 2013 and beyondHow to market your brand in 2013 and beyond
How to market your brand in 2013 and beyondJohan Ronnestam
 
Iadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En NavigatieIadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En NavigatieHans Kemp
 
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...Baden Hughes
 
0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff0910 Q2 Medialab Kickoff
0910 Q2 Medialab KickoffHans Kemp
 
Medialab Intro Studenten
Medialab Intro StudentenMedialab Intro Studenten
Medialab Intro StudentenHans Kemp
 
Webbdagarna 2013 Malmö - Keynote by Johan Ronnestam
Webbdagarna 2013 Malmö - Keynote by Johan RonnestamWebbdagarna 2013 Malmö - Keynote by Johan Ronnestam
Webbdagarna 2013 Malmö - Keynote by Johan RonnestamJohan Ronnestam
 
Zappos - National Society of Leadership and Success - 1-27-09
Zappos - National Society of Leadership and Success - 1-27-09Zappos - National Society of Leadership and Success - 1-27-09
Zappos - National Society of Leadership and Success - 1-27-09zappos
 
The Anglo Saxsons
The  Anglo  SaxsonsThe  Anglo  Saxsons
The Anglo Saxsonsguest0668dd
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionCorey Topf
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionCorey Topf
 
Week 5 Sponges
Week 5 SpongesWeek 5 Sponges
Week 5 SpongesCorey Topf
 
User Experience Design Introduction
User Experience Design   IntroductionUser Experience Design   Introduction
User Experience Design IntroductionHans Kemp
 
Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4Hans Kemp
 
Ep 2012 week3-educational-psychology
Ep 2012 week3-educational-psychologyEp 2012 week3-educational-psychology
Ep 2012 week3-educational-psychologylaurahe
 
Theme Intro User Research
Theme Intro User ResearchTheme Intro User Research
Theme Intro User ResearchHans Kemp
 
Minor User Experience English
Minor User Experience EnglishMinor User Experience English
Minor User Experience EnglishHans Kemp
 

Destaque (20)

How to market your brand in 2013 and beyond
How to market your brand in 2013 and beyondHow to market your brand in 2013 and beyond
How to market your brand in 2013 and beyond
 
Iadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En NavigatieIadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En Navigatie
 
Birkenes kommune
Birkenes kommuneBirkenes kommune
Birkenes kommune
 
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
 
0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff
 
Unit 2
Unit 2Unit 2
Unit 2
 
Medialab Intro Studenten
Medialab Intro StudentenMedialab Intro Studenten
Medialab Intro Studenten
 
Webbdagarna 2013 Malmö - Keynote by Johan Ronnestam
Webbdagarna 2013 Malmö - Keynote by Johan RonnestamWebbdagarna 2013 Malmö - Keynote by Johan Ronnestam
Webbdagarna 2013 Malmö - Keynote by Johan Ronnestam
 
Zappos - National Society of Leadership and Success - 1-27-09
Zappos - National Society of Leadership and Success - 1-27-09Zappos - National Society of Leadership and Success - 1-27-09
Zappos - National Society of Leadership and Success - 1-27-09
 
The Anglo Saxsons
The  Anglo  SaxsonsThe  Anglo  Saxsons
The Anglo Saxsons
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of Production
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of Production
 
Week 5 Sponges
Week 5 SpongesWeek 5 Sponges
Week 5 Sponges
 
User Experience Design Introduction
User Experience Design   IntroductionUser Experience Design   Introduction
User Experience Design Introduction
 
s
ss
s
 
Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4
 
Tozoid Et Vula
Tozoid Et VulaTozoid Et Vula
Tozoid Et Vula
 
Ep 2012 week3-educational-psychology
Ep 2012 week3-educational-psychologyEp 2012 week3-educational-psychology
Ep 2012 week3-educational-psychology
 
Theme Intro User Research
Theme Intro User ResearchTheme Intro User Research
Theme Intro User Research
 
Minor User Experience English
Minor User Experience EnglishMinor User Experience English
Minor User Experience English
 

Semelhante a Implementation of security standards and procedures

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachJim Cahill
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521Merlin Florrence
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 

Semelhante a Implementation of security standards and procedures (20)

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different Approach
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Information Security
Information SecurityInformation Security
Information Security
 
Notes prep guide
Notes prep guideNotes prep guide
Notes prep guide
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
Ch.5 rq (1)
Ch.5 rq (1)Ch.5 rq (1)
Ch.5 rq (1)
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 

Mais de StevenSegaert

Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeStevenSegaert
 
The organisation of social security coordination
The organisation of social security coordinationThe organisation of social security coordination
The organisation of social security coordinationStevenSegaert
 
Integration of information systems
Integration of information systemsIntegration of information systems
Integration of information systemsStevenSegaert
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environmentsStevenSegaert
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarksStevenSegaert
 
Interoperability frameworks
Interoperability frameworksInteroperability frameworks
Interoperability frameworksStevenSegaert
 

Mais de StevenSegaert (8)

Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchange
 
The organisation of social security coordination
The organisation of social security coordinationThe organisation of social security coordination
The organisation of social security coordination
 
Integration of information systems
Integration of information systemsIntegration of information systems
Integration of information systems
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environments
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarks
 
Interoperability frameworks
Interoperability frameworksInteroperability frameworks
Interoperability frameworks
 
eGA General 2008 NL
eGA General 2008 NLeGA General 2008 NL
eGA General 2008 NL
 
Tid+ Conference
Tid+ ConferenceTid+ Conference
Tid+ Conference
 

Implementation of security standards and procedures