SlideShare une entreprise Scribd logo
1  sur  17
Implementation of security standards and procedures
Topics ,[object Object]
Evolution of approach ,[object Object],[object Object],[object Object],[object Object]
Hard facts... ,[object Object],[object Object],[object Object],[object Object]
Data Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Level of (Information)security and  costs Security  level Costs Incidents Security Total 0 100
Common problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cost of security Security level Cost Incidents Information Security Total 0 100 Low High Medium
Pains ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object]
Upcoming challenges ,[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
Siddharth Janakiram
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
SARJERAO Sarju
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
Jonathan Coleman
 

Tendances (20)

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
)k
)k)k
)k
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Sec4
Sec4Sec4
Sec4
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 

En vedette

Iadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En NavigatieIadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En Navigatie
Hans Kemp
 
0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff
Hans Kemp
 
Medialab Intro Studenten
Medialab Intro StudentenMedialab Intro Studenten
Medialab Intro Studenten
Hans Kemp
 
The Anglo Saxsons
The  Anglo  SaxsonsThe  Anglo  Saxsons
The Anglo Saxsons
guest0668dd
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of Production
Corey Topf
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of Production
Corey Topf
 
Week 5 Sponges
Week 5 SpongesWeek 5 Sponges
Week 5 Sponges
Corey Topf
 
Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4
Hans Kemp
 
Ep 2012 week3-educational-psychology
Ep 2012 week3-educational-psychologyEp 2012 week3-educational-psychology
Ep 2012 week3-educational-psychology
laurahe
 
Theme Intro User Research
Theme Intro User ResearchTheme Intro User Research
Theme Intro User Research
Hans Kemp
 
Minor User Experience English
Minor User Experience EnglishMinor User Experience English
Minor User Experience English
Hans Kemp
 

En vedette (20)

How to market your brand in 2013 and beyond
How to market your brand in 2013 and beyondHow to market your brand in 2013 and beyond
How to market your brand in 2013 and beyond
 
Iadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En NavigatieIadd1 0910 Q2 Structuur En Navigatie
Iadd1 0910 Q2 Structuur En Navigatie
 
Birkenes kommune
Birkenes kommuneBirkenes kommune
Birkenes kommune
 
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
Object Reuse and Exchange (ORE) : Experience in the Open Language Archives Co...
 
0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff0910 Q2 Medialab Kickoff
0910 Q2 Medialab Kickoff
 
Unit 2
Unit 2Unit 2
Unit 2
 
Medialab Intro Studenten
Medialab Intro StudentenMedialab Intro Studenten
Medialab Intro Studenten
 
Webbdagarna 2013 Malmö - Keynote by Johan Ronnestam
Webbdagarna 2013 Malmö - Keynote by Johan RonnestamWebbdagarna 2013 Malmö - Keynote by Johan Ronnestam
Webbdagarna 2013 Malmö - Keynote by Johan Ronnestam
 
Zappos - National Society of Leadership and Success - 1-27-09
Zappos - National Society of Leadership and Success - 1-27-09Zappos - National Society of Leadership and Success - 1-27-09
Zappos - National Society of Leadership and Success - 1-27-09
 
The Anglo Saxsons
The  Anglo  SaxsonsThe  Anglo  Saxsons
The Anglo Saxsons
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of Production
 
Unit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of ProductionUnit 2 3 1 Costs Of Production
Unit 2 3 1 Costs Of Production
 
Week 5 Sponges
Week 5 SpongesWeek 5 Sponges
Week 5 Sponges
 
User Experience Design Introduction
User Experience Design   IntroductionUser Experience Design   Introduction
User Experience Design Introduction
 
s
ss
s
 
Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4Iad2 0910 q1 hoorcollege 4
Iad2 0910 q1 hoorcollege 4
 
Tozoid Et Vula
Tozoid Et VulaTozoid Et Vula
Tozoid Et Vula
 
Ep 2012 week3-educational-psychology
Ep 2012 week3-educational-psychologyEp 2012 week3-educational-psychology
Ep 2012 week3-educational-psychology
 
Theme Intro User Research
Theme Intro User ResearchTheme Intro User Research
Theme Intro User Research
 
Minor User Experience English
Minor User Experience EnglishMinor User Experience English
Minor User Experience English
 

Similaire à Implementation of security standards and procedures

Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
PECB
 

Similaire à Implementation of security standards and procedures (20)

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Control System Cyber Security - A Different Approach
Control System Cyber Security - A Different ApproachControl System Cyber Security - A Different Approach
Control System Cyber Security - A Different Approach
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Information Security
Information SecurityInformation Security
Information Security
 
Notes prep guide
Notes prep guideNotes prep guide
Notes prep guide
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
Ch.5 rq (1)
Ch.5 rq (1)Ch.5 rq (1)
Ch.5 rq (1)
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 

Plus de StevenSegaert (8)

Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchange
 
The organisation of social security coordination
The organisation of social security coordinationThe organisation of social security coordination
The organisation of social security coordination
 
Integration of information systems
Integration of information systemsIntegration of information systems
Integration of information systems
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environments
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarks
 
Interoperability frameworks
Interoperability frameworksInteroperability frameworks
Interoperability frameworks
 
eGA General 2008 NL
eGA General 2008 NLeGA General 2008 NL
eGA General 2008 NL
 
Tid+ Conference
Tid+ ConferenceTid+ Conference
Tid+ Conference
 

Implementation of security standards and procedures