SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne






ASYSTEMATICAPPROACHWHICHYOURAUDITORSUSE,HELPSTOANTICIPATETHREATSTOYOURORGANIZATION'S
INFORMATIONASSETS,ANDDEVELOPPLANSTOMITIGATETHEM.THEBESTPOLICYISTOADOPT
ISO27001,THEMOSTUNIVERSALLYACCEPTEDSTANDARDFORINFORMATIONSECURITYTHEWORLDOVER.
Formoreinfo
Contactus@info@intiGrow.com
REGISTERFORA2DAYFREEISO-27001GAP
ANALYSIS-DIPSTICKASSESSMENT:
http://www.intigrow.com/free-information-
security-assessment-offer.html
1GAPANALYSISINTIGROWSECURITYPROFESSIONALSWILL
CONDUCTANANALYSISOFGAPSINYOURCURRENTSYSTEMAGAINST
THEREQUIREMENTSOFISO27001INCLUDINGAPHYSICALSECURITY
REVIEW.
2RISKASSESSMENTTHISISTHEMOSTCRUCIALPHASEOFTHE
IMPLEMENTATION,WHEREINANASSETREGISTERCONTAININGALLTHE
INFORMATIONASSETSOFTHEORGANIZATIONISBUILT.
3RISKTREATMENTDURINGTHISPHASEINTIGROWWILL
FORMULATEASTRATEGYFORTHEIMPLEMENTATIONOFTHE
CONTROLSSELECTEDINTHEPREVIOUSPHASE.
4CONTROLIMPLEMENTATIONTHEIMPLEMENTATIONROADMAP,
WHICHISTHEOUTCOMEOFTHEPREVIOUSPHASEWILLGUIDEYOURORGA
NIZATION'STEAMINTHEIMPLEMENTATIONOFTHEIDENTIFIEDCONTROLS.
5ISMSREADINESSREVIEWTHISPHASEWILLREVIEWYOUR
READINESSTOACHIEVEISO27001CERTIFICATION.
6CERTIFICATIONAUDITFINALLY,YOUWILLFACETHE
CERTIFICATIONBODY'STEAMOFAUDITORSWITHOURASSISTANCE.
ISO27001ISTHEONLYAUDITABLEINTERNATIONALSTANDARDWHICHDEFINESTHE
REQUIREMENTSFORANINFORMATIONSECURITYMANAGEMENTSYSTEMISMS.
ISO27001IMPLEMENTATIONSTRATEGYIS
BASEDONAPHASEDAPPROACH:
UNDERSTANDINGANDCOMMUNICATINGTHERISKSIS
KEYTOEFFECTIVESECURITY
93%42%
33%
26%
OFLARGEORGANISATIONSDON’TPROVIDEANY
ONGOINGSECURITYAWARENESSTRAININGTO
THEIRSTAFFAND10%DON’TEVENBRIEFSTAFF
ONINDUCTION
OFRESPONDENTSHAVEN’TBRIEFEDTHEIRBOARDON
SECURITYRISKSINTHELASTYEARAND19%HAVE
NEVERDONESO
OFLARGEORGANISATIONSSAYRESPON
SIBILITIESFORENSURINGDATAIS
PROTECTEDAREN’TCLEARANDONLY
22%SAYTHEYAREVERYCLEAR
OFCOMPANIESWHERETHESECURITY
POLICYWASPOORLYUNDERSTOOD
HADSTAFFRELATEDBREACHES
VERSUS47%WHERETHEPOLICY
WASWELLUNDERSTOOD
SECURITYBREACHESREACHHIGHESTEVERLEVELSIN2012
93% 87%
OFLARGEORGANISATIONSHADA
SECURITYBREACH
OFSMALLBUSINESSESHADASECURITYBREACH
UPFROM76%AYEARAGO
OVERVIEWOFINFORMATIONSECURITYBREACHESIN2012
ANDHOWISO27001AUDITCANHELP
OFTHEWORSTSECURITYBREACHES
INTHEYEARWERECAUSEDBY
INADVERTENTHUMANERRORAND
AFURTHER10%BYDELIBERATE
MISUSEOFSYSTEMSBYSTAFF
OFTHESE
36% 57% 17%
OFSMALLBUSINESSESKNOW
THEIRSTAFFBROKEDATA
PROTECTIONREGULATIONSIN
THELASTYEARUPFROM11%A
YEARAGO
OFSMALLBUSINESSESSUFFERED
STAFFRELATEDSECURITY
BREACHESINTHELASTYEARUP
FROM45%AYEARAGO

Contenu connexe

En vedette

Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
Artefact powerpoint
Artefact powerpointArtefact powerpoint
Artefact powerpointamyyyv
 
Kubryak 23-09-2013
Kubryak 23-09-2013Kubryak 23-09-2013
Kubryak 23-09-2013BIO-Z17
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Libaisi Common Interest Youth Groups' contribution to food security in Wester...
Libaisi Common Interest Youth Groups' contribution to food security in Wester...Libaisi Common Interest Youth Groups' contribution to food security in Wester...
Libaisi Common Interest Youth Groups' contribution to food security in Wester...futureagricultures
 
Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)
Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)
Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)Rahul Gavade
 
№ 25
№ 25№ 25
№ 25Sosedy
 
宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT
宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT
宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LTEikichi Gotoh
 

En vedette (11)

Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Secure by design
Secure by designSecure by design
Secure by design
 
Artefact powerpoint
Artefact powerpointArtefact powerpoint
Artefact powerpoint
 
PANHALA
PANHALAPANHALA
PANHALA
 
Kubryak 23-09-2013
Kubryak 23-09-2013Kubryak 23-09-2013
Kubryak 23-09-2013
 
Preghiera a San Michele Arcangelo E-book
Preghiera a  San Michele Arcangelo E-bookPreghiera a  San Michele Arcangelo E-book
Preghiera a San Michele Arcangelo E-book
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Libaisi Common Interest Youth Groups' contribution to food security in Wester...
Libaisi Common Interest Youth Groups' contribution to food security in Wester...Libaisi Common Interest Youth Groups' contribution to food security in Wester...
Libaisi Common Interest Youth Groups' contribution to food security in Wester...
 
Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)
Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)
Presentation On Ganesh Chaturthi (Presented By- Rahul Ramchandra Gavade)
 
№ 25
№ 25№ 25
№ 25
 
宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT
宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT
宮本武蔵と考える剣道における二刀流という冗長化 - JAWS DAYS 2014 A-1 GP LT
 

overview of information security breaches in 2012 and how iso 27001 audit can help