SlideShare une entreprise Scribd logo
1  sur  11
Secom : Managing Information Security in a risky World Group – 2   |  Section E Inderpreet Singh | Jigar Patel | Kapil Dev Soni  | Kumar Amit Manu Gupt | Payal S. Kapoor  | Santosh Lohiya | Saurabh Singh Indian Institute of Management, Indore
Jashopper
The Secom Group
Secom Trust System’s Information Security Business
What is the current status of security systems at Jashopper? Is it adequate?
The current status of security systems at Jashoppers included the following features: Although Jashopper believed that they had standard security measure but still the current security systems was not enough for future business
2) How should Sekine go about choosing the security products to use? What are your recommendations?
Sekine should consider the following points before making any decision
Recommendation Sekine should go for the following security solution from Secom Secom Intrusion Detection/Preventive Service
Group 2 . Sec E Thank You

Contenu connexe

Tendances

Alphabet Eyes New Frontiers
Alphabet Eyes New FrontiersAlphabet Eyes New Frontiers
Alphabet Eyes New FrontiersRadha Gupta
 
Xiamen case study
Xiamen case studyXiamen case study
Xiamen case studymahi teja
 
Power, office politics, and a career in crisis
Power, office politics, and a career in crisisPower, office politics, and a career in crisis
Power, office politics, and a career in crisisEbtesam Elias
 
Strategic Review and Analysis of Egon Zehnder
Strategic Review and Analysis of Egon ZehnderStrategic Review and Analysis of Egon Zehnder
Strategic Review and Analysis of Egon ZehnderMathan Anto Marshine
 
SG Cowen New Recruits
SG Cowen New RecruitsSG Cowen New Recruits
SG Cowen New RecruitsInes Ha
 
GE's Two-Decade Transformation: Jack Welch's Leadership
GE's Two-Decade Transformation: Jack Welch's LeadershipGE's Two-Decade Transformation: Jack Welch's Leadership
GE's Two-Decade Transformation: Jack Welch's LeadershipRahul Wane
 
Rob Parson At Morgan Stanley
Rob Parson At Morgan Stanley Rob Parson At Morgan Stanley
Rob Parson At Morgan Stanley PIYUSH KUMAR
 
Toyota Operations Case Study
Toyota Operations Case Study Toyota Operations Case Study
Toyota Operations Case Study Martin Massiah
 
Morning Star Case Study
Morning Star Case Study Morning Star Case Study
Morning Star Case Study Ashuvyas2128
 
Sales soft analysis - group a v2.0
Sales soft   analysis - group a v2.0Sales soft   analysis - group a v2.0
Sales soft analysis - group a v2.0Sanmeet Dhokay
 
Mindtree: A community of communities
Mindtree: A community of communitiesMindtree: A community of communities
Mindtree: A community of communitiesRiya Aseef
 
Cola Wars Continue: Coke and Pepsi in 2010
Cola Wars Continue: Coke and Pepsi in 2010Cola Wars Continue: Coke and Pepsi in 2010
Cola Wars Continue: Coke and Pepsi in 2010Sharon
 
Barco Projection Systems Case Study
Barco Projection Systems Case StudyBarco Projection Systems Case Study
Barco Projection Systems Case StudyBCronin2
 
Nucor Case Analysis
Nucor Case AnalysisNucor Case Analysis
Nucor Case AnalysisBskwarski87
 

Tendances (20)

Alphabet Eyes New Frontiers
Alphabet Eyes New FrontiersAlphabet Eyes New Frontiers
Alphabet Eyes New Frontiers
 
Montreaux chocolate USA
Montreaux chocolate USAMontreaux chocolate USA
Montreaux chocolate USA
 
Montreaux (1)
Montreaux (1)Montreaux (1)
Montreaux (1)
 
Xiamen case study
Xiamen case studyXiamen case study
Xiamen case study
 
Power, office politics, and a career in crisis
Power, office politics, and a career in crisisPower, office politics, and a career in crisis
Power, office politics, and a career in crisis
 
Strategic Review and Analysis of Egon Zehnder
Strategic Review and Analysis of Egon ZehnderStrategic Review and Analysis of Egon Zehnder
Strategic Review and Analysis of Egon Zehnder
 
SG Cowen New Recruits
SG Cowen New RecruitsSG Cowen New Recruits
SG Cowen New Recruits
 
GE's Two-Decade Transformation: Jack Welch's Leadership
GE's Two-Decade Transformation: Jack Welch's LeadershipGE's Two-Decade Transformation: Jack Welch's Leadership
GE's Two-Decade Transformation: Jack Welch's Leadership
 
Rob Parson At Morgan Stanley
Rob Parson At Morgan Stanley Rob Parson At Morgan Stanley
Rob Parson At Morgan Stanley
 
Sale soft inc
Sale soft incSale soft inc
Sale soft inc
 
Toyota Operations Case Study
Toyota Operations Case Study Toyota Operations Case Study
Toyota Operations Case Study
 
Morning Star Case Study
Morning Star Case Study Morning Star Case Study
Morning Star Case Study
 
Sales soft analysis - group a v2.0
Sales soft   analysis - group a v2.0Sales soft   analysis - group a v2.0
Sales soft analysis - group a v2.0
 
Tru earth case study
Tru earth case studyTru earth case study
Tru earth case study
 
Mindtree: A community of communities
Mindtree: A community of communitiesMindtree: A community of communities
Mindtree: A community of communities
 
Cola Wars Continue: Coke and Pepsi in 2010
Cola Wars Continue: Coke and Pepsi in 2010Cola Wars Continue: Coke and Pepsi in 2010
Cola Wars Continue: Coke and Pepsi in 2010
 
Henry Tam and the MGI Team
Henry Tam and the MGI TeamHenry Tam and the MGI Team
Henry Tam and the MGI Team
 
Barco Projection Systems Case Study
Barco Projection Systems Case StudyBarco Projection Systems Case Study
Barco Projection Systems Case Study
 
Nucor Case Analysis
Nucor Case AnalysisNucor Case Analysis
Nucor Case Analysis
 
Mind tree:A community of communities
Mind tree:A community of communitiesMind tree:A community of communities
Mind tree:A community of communities
 

Similaire à secom : managing information security in a risky world

BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityCigital
 
Enforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesEnforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesJuan J. Merelo
 
BCM and IT Security
BCM and IT SecurityBCM and IT Security
BCM and IT Securityleninkster
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14subramanian K
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityElumalai Vasan
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...CSCJournals
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...IJCSIS Research Publications
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
Expert System & MIS.pptx
Expert System & MIS.pptxExpert System & MIS.pptx
Expert System & MIS.pptxSri Sabari
 
Enterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security ServicesEnterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security ServicesAkshay Kurhade
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security programabdulkhalid murady
 

Similaire à secom : managing information security in a risky world (20)

BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Enforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesEnforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence Techniques
 
BCM and IT Security
BCM and IT SecurityBCM and IT Security
BCM and IT Security
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Expert System & MIS.pptx
Expert System & MIS.pptxExpert System & MIS.pptx
Expert System & MIS.pptx
 
Enterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security ServicesEnterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security Services
 
Cummins
CumminsCummins
Cummins
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
 

Dernier

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Dernier (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

secom : managing information security in a risky world

  • 1. Secom : Managing Information Security in a risky World Group – 2 | Section E Inderpreet Singh | Jigar Patel | Kapil Dev Soni | Kumar Amit Manu Gupt | Payal S. Kapoor | Santosh Lohiya | Saurabh Singh Indian Institute of Management, Indore
  • 4. Secom Trust System’s Information Security Business
  • 5. What is the current status of security systems at Jashopper? Is it adequate?
  • 6. The current status of security systems at Jashoppers included the following features: Although Jashopper believed that they had standard security measure but still the current security systems was not enough for future business
  • 7. 2) How should Sekine go about choosing the security products to use? What are your recommendations?
  • 8. Sekine should consider the following points before making any decision
  • 9. Recommendation Sekine should go for the following security solution from Secom Secom Intrusion Detection/Preventive Service
  • 10.
  • 11. Group 2 . Sec E Thank You