SlideShare une entreprise Scribd logo
1  sur  33
Top Management Role in Implementing
ISO/IEC 27001
Mohamad Khachab, MBA, PECB Certified Trainer,
ISO 27001 LI, ISO 27005 RM
January 27, 2016
1
Mohamad Khachab
Lecturer, Management
Consultant
Mr. Mohamad Khachab has 30 years of professional experience in management consultancy,
project management, teaching/training, IT Procurement, preparing proposals, information risk
management, research, developing bidding documents, and business development activities.
703-962-0793
khachabmy@ics4business.com www.ics4business.com
linkedin.com/in/mohamadkhachab
Top Management Role in Implementing
ISO/IEC 27001
Agenda
• Introduction
• ISO 27001 Standard
• Structure & Controls
• Costs
• PDCA Mode
• Data Qualities
• Management Planning
• Decision Making factors
• Implementation Project Phases
3PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Introduction
• All about “Tone at the Top”
• Strategic & healthy atmosphere
• TQM is a long term strategy
• Enterprise-wide awareness
• Senior management involvement
• Education/training (facts only, statistical
methods, no myth)
• Decision making techniques
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 4
ISO 27001
• ISO 27001 requires a company to
establish, implement, and maintain a
continuous improvement approach
to manage its ISMS.
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 5
ISO 27001 Standard
1. Scope of the standard
2. How the document is referenced
3. Reuse of the terms and definitions in ISO/IEC 27000
4. Organizational context and stakeholders
5. Information security leadership and high-level support for policy
6. Planning an information security management system; risk assessment;
risk treatment
7. Supporting an information security management system
8. Making an information security management system operational
9. Reviewing the system's performance
10. Corrective action
Annex A: List of controls and their objectives.
PECB Webinar, Khachab, Management
Role in Implementing ISO 27001, Jan. 27,
2016
6
ISO 27001 Standard
ISO 27001:2013 details 114 controls or security measures organized into 14 groups:
• Information security policies (2 controls)
• Organization of information security (7 controls)
• Human resource security - 6 controls that are applied before, during, or after
employment
• Asset management (10 controls)
• Access control (14 controls)
• Cryptography (2 controls)
• Physical and environmental security (15 controls)
• Operations security (14 controls)
• Communications security (7 controls)
• System acquisition, development and maintenance (13 controls)
• Supplier relationships (5 controls)
• Information security incident management (7 controls)
• Information security aspects of business continuity management (4 controls)
• Compliance; with internal requirements, such as policies, and with external
requirements, such as laws (8 controls)
7PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Costs
Are driven by risk perception and how much risk
the organization is prepared to accept. Four
costs to consider by management:
1- Internal resources
2- External resources
3- Certification
4- Implementation
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 8
PDCA Model
9PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Process Objectives
Easy understanding and implementation
Desired results:
- Time and cost savings in mind.
- Management Review of processes.
10PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Data Qualities
• Confidentiality – Ensure information is accessible
only to those authorized to have access
• Integrity – Safeguard the accuracy and completeness
of information and processing methods.
• Availability – Ensure that authorized users have
access to information and assets when required.
11PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
What is your organization Like?
• I want you to think in terms of:
– Culture
– Management practice
– Formal processes
– Maturity of TQM processes
– Strategies and business planning
– Internal Audit function
– IT Department and customer satisfaction
• Senior managers decisions making rational?
12PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Do you have a TQM Strategy?
TQM strategies vary from one organization to
another, but there must be a set of primary
elements present:
• Top management has identified TQM as one
of the organizations’ long term and
competitive strategies and is committed to it.
13
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Management Planning
Vital to the success of implementation are two
critical functions:
1.Effective input and early involvement of The
Internal Audit Dept contribute to:
effective development of implementation
strategy, and management review
(contribution) during certification stages.
14
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Management Planning (Cont.)
2. IT Department will have to dedicate resources
and time to the ISO 27001 implementation
project.
Many Constraints and questions:
- Are there other IT compliance initiatives?
- Procedures & policies (in-works)?
- How mature are the existing IT processes and
controls?
- Are they aligned with the ISO 27001
Requirements?
15PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Enterprise Wide Project
Other business departments play an
important role in the ISMS
implementation.
16PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Decision Making Factors
A number of factors influence when and how to
implement a standard:
– Business Objectives and priorities
– Existing IT maturity levels
– User acceptability and awareness
– Internal audit capability
– Contractual obligations
– Customer requirements
– Ability to adapt to change
– Adherence to internal processes
– Existing compliance efforts and legal requirements
– Existing training programs
17PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Implementation Roadmap
• Initial Approach
• Management Support
• Scoping
• Planning
• Communications
• Risk Assessment
• Controls Selection
• Documentation
• Testing
• Successful Certification
PECB Webinar, Khachab, Management
Role in Implementing ISO 27001, Jan. 27,
2016
18
Advise
- Address risks and opportunities rather than
preventive action.
- Stress on maintaining documented
information rather than the information
record.
- Set objectives.
- Monitor performance and develop metrics.
PECB Webinar, Khachab, Management
Role in Implementing ISO 27001, Jan. 27,
2016
19
ISO 27001 Suggested Steps
• Define an ISMS Policy.
• Define the scope of the ISMS.
• Perform a security risk assessment.
• Manage the identified risk.
• Select controls to be implemented and
applied.
• Prepare an SOA.
20PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Identify Business Objectives
• You should know your interested parties
(stakeholders).
• Identify and prioritize objectives to gain
management support.
• Objectives are identified from business
documents as: Mission, Strategic Plan and IT
Business Plan.
21PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Identify Business Objectives
• Increase marketing reach.
• Assurance to business partners and customers.
• Increased revenue and profitability
• Assets identification
• Effective risk assessment
• Preserve organization’s reputation
• Compliance with government and industry
regulators
22PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Obtain Management Support
Includes initiatives as:
• Information security policy exist.
• Information security objectives and plans.
• Roles & Responsibilities Information security matrix exist.
• Communicating the importance of adherence to information
security policies to the whole organization.
• Sufficient resources identified (manage, develop, maintain,
and implement the ISMS).
• Determination of the acceptable risk level.
• Periodic management reviews of the ISMS.
• Assurance of proper training to affected personnel by the
ISMS.
• Appointment of competent personnel accordingly in their
assigned roles & duties.
23PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Implementation Scope
Standard requires listing scope exclusions and reasons.
When setting scope, consider:
- The selected scope helps achieve the identified business
objectives.
- Organization’s overall scale of operations to determine
the process’ complexity level.
- # of employees, business processes, # locations, products,
and services offered.
- What areas, locations, assets or technologies will be
controlled by the ISMS.
- Does the ISMS apply to suppliers?
- Are there dependencies on other organizations?
- Any regulatory or legislative standard applicable ?
24PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Define a Risk Assessment Method
Risk assessment method must be defined and
documented. Things to consider:
• Which method used to assess the risk?
• Which risks are intolerable? and must be
mitigated.
• Manage the residual risk!
25PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Prepare Inventory of Information Assets
Management has to prioritize assets (to be protected) according
to risk classification plus record owners, location, criticality
and replacement value of assets.
Three impact levels: high, medium, and low.
Identify risks and classify them according to severity and
vulnerability.
Based on risk values, determine whether risk is tolerable? Do we
need to implement a control to eliminate or reduce the risk.
26PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Create a Risk Treatment Plan
• Organizations must either accept, avoid, transfer or
reduce the risk to an acceptable level.
• Identification of operational controls and additional
proposed controls.
• It is very important to obtain management approval of
the proposed residual risks.
• Develop a schedule of proposed control
implementation.
27PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Allocate Resources & Train your Staff
The ISMS process highlights one of the most
important commitments for management:
Resources to manage, develop, maintain, and
implement the ISMS.
- Auditors ask to see documentation of training.
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 28
Monitor the Implementation of ISMS
• Internal audit review consists of testing of
controls and identifying corrective/preventive
actions.
• ISMS needs to be reviewed by management at
periodic planned intervals.
• Project Management Review: Follows
changes/improvement to policies, procedures,
controls and staffing decisions.
• Document and maintain all results.
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 29
Prepare for the Certification Audit
To be certified:
• Organization must conduct a full cycle of
internal audits,
• Management reviews and activities in the
PDCA process,
• Retains evidence of reviews and audits, and
• Management should review risk assessments,
risk treatment plans, SOA, and policies &
procedures annually.
PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 30
Conduct Periodic Assessment Audits
• ISO 27001 follows the PDCA cycle and assists
management in knowing enterprise progression
along the cycle.
• Follow-up reviews or periodic audits confirm that the
organization remains in compliance with standard.
• Certification maintenance requires periodic
reassessment audits to confirm that the ISMS
continues to operate as specified.
31PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
Top Management Role in Implementing ISO/IEC 27001
References
• http://www.isaca.org/Journal/archives/2011/Volume-4/Documents/jpdf11v4-
Planning-for-and.pdf
• wwwo.aston-global.com/ISO900_14_setps_to_Implementation.pdf
• The Certified Manager of Quality/Organizational Excellence Handbook, Pages 293-
294
32
PECB Webinar, Khachab, Management
Role in Implementing ISO 27001, Jan. 27,
2016
??
QUESTIONS
THANK YOU
703-962-0793
khachabmy@ics4business.com www.ics4business.com
linkedin.com/in/mohamadkhachab

Contenu connexe

Tendances

Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxMukesh Pant
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 

Tendances (20)

ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 

En vedette

ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
The best way to use ISO 27001
The best way to use ISO 27001The best way to use ISO 27001
The best way to use ISO 27001powertech
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 ImplementationPECB
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
PECB Webinar: ISO 27001 in the world today. Why you should consider it?
PECB Webinar: ISO 27001 in the world today. Why you should consider it?PECB Webinar: ISO 27001 in the world today. Why you should consider it?
PECB Webinar: ISO 27001 in the world today. Why you should consider it?PECB
 
How the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk ManagementHow the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk ManagementLars Neupart
 
Changing the role of top management
Changing the role of top managementChanging the role of top management
Changing the role of top managementch33ku
 
039 agency vs stewardship theory
039 agency vs stewardship theory039 agency vs stewardship theory
039 agency vs stewardship theoryharoonmuhammad
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsCertification Europe
 
Iso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitimiIso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitiminbeksi
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 

En vedette (20)

ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
The best way to use ISO 27001
The best way to use ISO 27001The best way to use ISO 27001
The best way to use ISO 27001
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
5 Stages Of ITIL !!
5 Stages Of ITIL !!5 Stages Of ITIL !!
5 Stages Of ITIL !!
 
PECB Webinar: ISO 27001 in the world today. Why you should consider it?
PECB Webinar: ISO 27001 in the world today. Why you should consider it?PECB Webinar: ISO 27001 in the world today. Why you should consider it?
PECB Webinar: ISO 27001 in the world today. Why you should consider it?
 
How the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk ManagementHow the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk Management
 
Changing the role of top management
Changing the role of top managementChanging the role of top management
Changing the role of top management
 
Role of top managers
Role of top managersRole of top managers
Role of top managers
 
Introduccion ISO 27001 SGSI
Introduccion ISO 27001 SGSIIntroduccion ISO 27001 SGSI
Introduccion ISO 27001 SGSI
 
039 agency vs stewardship theory
039 agency vs stewardship theory039 agency vs stewardship theory
039 agency vs stewardship theory
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and Developments
 
Iso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitimiIso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitimi
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 

Similaire à Top management role to implement ISO 27001

Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
ISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsPECB
 
QMS awareness 12th may 2015
QMS awareness 12th may 2015QMS awareness 12th may 2015
QMS awareness 12th may 2015Amr Eldakroury
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
 
Certification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQACertification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQANQA
 
ISO 9001 2015 Overview presentation
ISO 9001 2015 Overview presentation ISO 9001 2015 Overview presentation
ISO 9001 2015 Overview presentation Govind Ramu
 
Topic 1 - Risk Auditing 1-17.pdf
Topic 1 - Risk Auditing 1-17.pdfTopic 1 - Risk Auditing 1-17.pdf
Topic 1 - Risk Auditing 1-17.pdfJavier138365
 
ISO 9001:2015 Review and Why It Is Good (10/28/16)
ISO 9001:2015 Review and Why It Is Good (10/28/16)ISO 9001:2015 Review and Why It Is Good (10/28/16)
ISO 9001:2015 Review and Why It Is Good (10/28/16)Colin Gray
 
Session 3B Quality Assurance and Building Effective Oversight System - Paul H...
Session 3B Quality Assurance and Building Effective Oversight System - Paul H...Session 3B Quality Assurance and Building Effective Oversight System - Paul H...
Session 3B Quality Assurance and Building Effective Oversight System - Paul H...International Federation of Accountants
 

Similaire à Top management role to implement ISO 27001 (20)

Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
ISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsISO 45001 Key Implementation Steps
ISO 45001 Key Implementation Steps
 
Intro to ISO
Intro to ISOIntro to ISO
Intro to ISO
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
QMS awareness 12th may 2015
QMS awareness 12th may 2015QMS awareness 12th may 2015
QMS awareness 12th may 2015
 
Qsys Profile
Qsys ProfileQsys Profile
Qsys Profile
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
 
Certification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQACertification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQA
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
 
ISO 9001 2015 Overview presentation
ISO 9001 2015 Overview presentation ISO 9001 2015 Overview presentation
ISO 9001 2015 Overview presentation
 
Internal audit day 1
Internal audit day 1Internal audit day 1
Internal audit day 1
 
Topic 1 - Risk Auditing 1-17.pdf
Topic 1 - Risk Auditing 1-17.pdfTopic 1 - Risk Auditing 1-17.pdf
Topic 1 - Risk Auditing 1-17.pdf
 
ISO 9001:2015 Review and Why It Is Good (10/28/16)
ISO 9001:2015 Review and Why It Is Good (10/28/16)ISO 9001:2015 Review and Why It Is Good (10/28/16)
ISO 9001:2015 Review and Why It Is Good (10/28/16)
 
Iso 27001 lead auditor
Iso 27001 lead auditorIso 27001 lead auditor
Iso 27001 lead auditor
 
Iso 45001 2018
Iso 45001 2018Iso 45001 2018
Iso 45001 2018
 
Isms
IsmsIsms
Isms
 
standards1.pdf
standards1.pdfstandards1.pdf
standards1.pdf
 
Session 3B Quality Assurance and Building Effective Oversight System - Paul H...
Session 3B Quality Assurance and Building Effective Oversight System - Paul H...Session 3B Quality Assurance and Building Effective Oversight System - Paul H...
Session 3B Quality Assurance and Building Effective Oversight System - Paul H...
 

Plus de PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

Plus de PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Dernier

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Dernier (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Top management role to implement ISO 27001

  • 1. Top Management Role in Implementing ISO/IEC 27001 Mohamad Khachab, MBA, PECB Certified Trainer, ISO 27001 LI, ISO 27005 RM January 27, 2016 1
  • 2. Mohamad Khachab Lecturer, Management Consultant Mr. Mohamad Khachab has 30 years of professional experience in management consultancy, project management, teaching/training, IT Procurement, preparing proposals, information risk management, research, developing bidding documents, and business development activities. 703-962-0793 khachabmy@ics4business.com www.ics4business.com linkedin.com/in/mohamadkhachab
  • 3. Top Management Role in Implementing ISO/IEC 27001 Agenda • Introduction • ISO 27001 Standard • Structure & Controls • Costs • PDCA Mode • Data Qualities • Management Planning • Decision Making factors • Implementation Project Phases 3PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 4. Introduction • All about “Tone at the Top” • Strategic & healthy atmosphere • TQM is a long term strategy • Enterprise-wide awareness • Senior management involvement • Education/training (facts only, statistical methods, no myth) • Decision making techniques PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 4
  • 5. ISO 27001 • ISO 27001 requires a company to establish, implement, and maintain a continuous improvement approach to manage its ISMS. PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 5
  • 6. ISO 27001 Standard 1. Scope of the standard 2. How the document is referenced 3. Reuse of the terms and definitions in ISO/IEC 27000 4. Organizational context and stakeholders 5. Information security leadership and high-level support for policy 6. Planning an information security management system; risk assessment; risk treatment 7. Supporting an information security management system 8. Making an information security management system operational 9. Reviewing the system's performance 10. Corrective action Annex A: List of controls and their objectives. PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 6
  • 7. ISO 27001 Standard ISO 27001:2013 details 114 controls or security measures organized into 14 groups: • Information security policies (2 controls) • Organization of information security (7 controls) • Human resource security - 6 controls that are applied before, during, or after employment • Asset management (10 controls) • Access control (14 controls) • Cryptography (2 controls) • Physical and environmental security (15 controls) • Operations security (14 controls) • Communications security (7 controls) • System acquisition, development and maintenance (13 controls) • Supplier relationships (5 controls) • Information security incident management (7 controls) • Information security aspects of business continuity management (4 controls) • Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls) 7PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 8. Costs Are driven by risk perception and how much risk the organization is prepared to accept. Four costs to consider by management: 1- Internal resources 2- External resources 3- Certification 4- Implementation PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 8
  • 9. PDCA Model 9PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 10. Process Objectives Easy understanding and implementation Desired results: - Time and cost savings in mind. - Management Review of processes. 10PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 11. Data Qualities • Confidentiality – Ensure information is accessible only to those authorized to have access • Integrity – Safeguard the accuracy and completeness of information and processing methods. • Availability – Ensure that authorized users have access to information and assets when required. 11PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 12. What is your organization Like? • I want you to think in terms of: – Culture – Management practice – Formal processes – Maturity of TQM processes – Strategies and business planning – Internal Audit function – IT Department and customer satisfaction • Senior managers decisions making rational? 12PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 13. Do you have a TQM Strategy? TQM strategies vary from one organization to another, but there must be a set of primary elements present: • Top management has identified TQM as one of the organizations’ long term and competitive strategies and is committed to it. 13 PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 14. Management Planning Vital to the success of implementation are two critical functions: 1.Effective input and early involvement of The Internal Audit Dept contribute to: effective development of implementation strategy, and management review (contribution) during certification stages. 14 PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 15. Management Planning (Cont.) 2. IT Department will have to dedicate resources and time to the ISO 27001 implementation project. Many Constraints and questions: - Are there other IT compliance initiatives? - Procedures & policies (in-works)? - How mature are the existing IT processes and controls? - Are they aligned with the ISO 27001 Requirements? 15PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 16. Enterprise Wide Project Other business departments play an important role in the ISMS implementation. 16PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 17. Decision Making Factors A number of factors influence when and how to implement a standard: – Business Objectives and priorities – Existing IT maturity levels – User acceptability and awareness – Internal audit capability – Contractual obligations – Customer requirements – Ability to adapt to change – Adherence to internal processes – Existing compliance efforts and legal requirements – Existing training programs 17PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 18. Implementation Roadmap • Initial Approach • Management Support • Scoping • Planning • Communications • Risk Assessment • Controls Selection • Documentation • Testing • Successful Certification PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 18
  • 19. Advise - Address risks and opportunities rather than preventive action. - Stress on maintaining documented information rather than the information record. - Set objectives. - Monitor performance and develop metrics. PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 19
  • 20. ISO 27001 Suggested Steps • Define an ISMS Policy. • Define the scope of the ISMS. • Perform a security risk assessment. • Manage the identified risk. • Select controls to be implemented and applied. • Prepare an SOA. 20PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 21. Identify Business Objectives • You should know your interested parties (stakeholders). • Identify and prioritize objectives to gain management support. • Objectives are identified from business documents as: Mission, Strategic Plan and IT Business Plan. 21PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 22. Identify Business Objectives • Increase marketing reach. • Assurance to business partners and customers. • Increased revenue and profitability • Assets identification • Effective risk assessment • Preserve organization’s reputation • Compliance with government and industry regulators 22PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 23. Obtain Management Support Includes initiatives as: • Information security policy exist. • Information security objectives and plans. • Roles & Responsibilities Information security matrix exist. • Communicating the importance of adherence to information security policies to the whole organization. • Sufficient resources identified (manage, develop, maintain, and implement the ISMS). • Determination of the acceptable risk level. • Periodic management reviews of the ISMS. • Assurance of proper training to affected personnel by the ISMS. • Appointment of competent personnel accordingly in their assigned roles & duties. 23PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 24. Implementation Scope Standard requires listing scope exclusions and reasons. When setting scope, consider: - The selected scope helps achieve the identified business objectives. - Organization’s overall scale of operations to determine the process’ complexity level. - # of employees, business processes, # locations, products, and services offered. - What areas, locations, assets or technologies will be controlled by the ISMS. - Does the ISMS apply to suppliers? - Are there dependencies on other organizations? - Any regulatory or legislative standard applicable ? 24PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 25. Define a Risk Assessment Method Risk assessment method must be defined and documented. Things to consider: • Which method used to assess the risk? • Which risks are intolerable? and must be mitigated. • Manage the residual risk! 25PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 26. Prepare Inventory of Information Assets Management has to prioritize assets (to be protected) according to risk classification plus record owners, location, criticality and replacement value of assets. Three impact levels: high, medium, and low. Identify risks and classify them according to severity and vulnerability. Based on risk values, determine whether risk is tolerable? Do we need to implement a control to eliminate or reduce the risk. 26PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 27. Create a Risk Treatment Plan • Organizations must either accept, avoid, transfer or reduce the risk to an acceptable level. • Identification of operational controls and additional proposed controls. • It is very important to obtain management approval of the proposed residual risks. • Develop a schedule of proposed control implementation. 27PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 28. Allocate Resources & Train your Staff The ISMS process highlights one of the most important commitments for management: Resources to manage, develop, maintain, and implement the ISMS. - Auditors ask to see documentation of training. PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 28
  • 29. Monitor the Implementation of ISMS • Internal audit review consists of testing of controls and identifying corrective/preventive actions. • ISMS needs to be reviewed by management at periodic planned intervals. • Project Management Review: Follows changes/improvement to policies, procedures, controls and staffing decisions. • Document and maintain all results. PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 29
  • 30. Prepare for the Certification Audit To be certified: • Organization must conduct a full cycle of internal audits, • Management reviews and activities in the PDCA process, • Retains evidence of reviews and audits, and • Management should review risk assessments, risk treatment plans, SOA, and policies & procedures annually. PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016 30
  • 31. Conduct Periodic Assessment Audits • ISO 27001 follows the PDCA cycle and assists management in knowing enterprise progression along the cycle. • Follow-up reviews or periodic audits confirm that the organization remains in compliance with standard. • Certification maintenance requires periodic reassessment audits to confirm that the ISMS continues to operate as specified. 31PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016
  • 32. Top Management Role in Implementing ISO/IEC 27001 References • http://www.isaca.org/Journal/archives/2011/Volume-4/Documents/jpdf11v4- Planning-for-and.pdf • wwwo.aston-global.com/ISO900_14_setps_to_Implementation.pdf • The Certified Manager of Quality/Organizational Excellence Handbook, Pages 293- 294 32 PECB Webinar, Khachab, Management Role in Implementing ISO 27001, Jan. 27, 2016

Notes de l'éditeur

  1. 1- ISMS covers a wide range of business management functions, HR, IT, facilities & security. Resources from these departments are required during the implementation. 2- Experienced consultants. Will help during internal audits and ensure smooth transition toward certification. 3- Certification: fees paid to certification agencies to assess organization against ISO 27001 std. 4- Implementation: These costs depend largely on the health of IT within the organization. Implementation costs are positively correlated with the risk assessment gap or audit. Implementing a QMS can take anywhere from 4 to one year depending on management support, size and nature of organization, IT maturity, and quality/amount of existing documentation and change management.
  2. Each organization is unique in terms of the culture, management practices, and the processes used to create and deliver its products and services.
  3. Although the implementation of policies and procedures is largely perceived as an IT activity, other departments play an important role. Many examples: Facilities Management responsible for physical security and access control.
  4. PDCA Model is consistent with auditable Int’l standards.
  5. Management must lead these tasks. Assurance to business partners and customers about organization commitment to Information security, privacy and data protection. Increased revenue and profitability by providing the highest level of security of sensitive data.
  6. Management must make a commitment to planning, implementation, operation, monitoring, review, maintenance and improvement of the ISMS. This ensures that management commits the number and type of resources needed to work on The ISMS. Also that resources have had the proper training, awareness, and competency.
  7. Implementation scope may cover all or part of an organization. Regulators or government standards come from the relevant industry, state/local or federal government, or from international regulators. The scope shall be kept manageable, otherwise can get out of hand.
  8. A careful consideration to policies, procedures, and controls. Choosing which risk assessment method is a critical phase in establishing the ISMS.
  9. A risk assessment methodology does provide guidance on establishing risk levels for assets. Once the assessment is completed, assets with intolerable risks are identified, along with the control to mitigate that risk.
  10. It is all about how you manage residual risks.
  11. External auditor will examine the ISMS documents to determine the scope and contents of the ISMS. The objective of the review and audit is to have sufficient evidence and review/audit documents sent to an auditor for review. The evidence and document will demonstrate the efficiency and effectiveness of the implemented ISMS in the organization and its business units.